Table | Card | RUSMARC | |
Allowed Actions:
Group: Anonymous Network: Internet |
Annotation
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
ILC SPbPU Local Network | All | |||||
Internet | Authorized users SPbPU | |||||
Internet | Anonymous |
Table of Contents
- About DeG PRESS
- Acknowledgments
- About the Authors
- Contents
- Introduction
- Chapter 1. Security Mindset
- Chapter 2. Common Cybersecurity Attacks
- Chapter 3. Protecting Your Computer(s)
- Chapter 4. Protecting Your Passwords
- Chapter 5. Protecting Your Home Network
- Chapter 6. Smartphones and Tablets
- Chapter 7. Protecting Your Web Browsing
- Chapter 8. Protecting Your E-Mail and Phone Calls
- Chapter 9. Protecting Your Identity, Privacy, and Family Online
- Chapter 10. Protecting Yourself on Travel
- Chapter 11. When Things Go Wrong
- Chapter 12. Considering Cybersecurity at Work
- Chapter 13. Final Thoughts
- Appendix A. Common Online Scams
- Appendix B. The Worst Passwords Ever
- Appendix C. Online Security Resources
- Glossary
- Index
Usage statistics
pdf/2026757.pdf
Access count: 0
Last 30 days: 0 Detailed usage statistics |
epub/2026757.epub
Access count: 0
Last 30 days: 0 Detailed usage statistics |