Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the…mehr
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! * The who and why of cybersecurity threats * Basic cybersecurity concepts * What to do to be cyber-secure * Cybersecurity careers * What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.
Joseph Steinberg is a cybersecurity and emerging technologies advisor with two decades of industry experience. One of only 28 people worldwide to hold the entire suite of advanced information security certifications (CISSP, ISSAP, ISSMP, and CSSLP), he writes an independent column covering cybersecurity and privacy, after previously covering those topics for Forbes and Inc. Magazine. He also authors thought leadership articles for many technology companies, including IBM and Microsoft, and has invented various cybersecurity-related technologies, which are cited in more than 400 U.S. patent filings.
Inhaltsangabe
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49