Cybersecurity For Dummies

Cybersecurity For Dummies
Автор книги: id книги: 2294890     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 2536,79 руб.     (27,57$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119867203 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Explore the latest developments in cybersecurity with this essential guide Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure—and it doesn’t take a degree in computer science to make it happen! Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company’s, too). You’ll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised. The book also offers: Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target Step-by-step instructions on how to create data backups and implement strong encryption Basic info that every aspiring cybersecurity professional needs to know Cybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.

Оглавление

Joseph Steinberg. Cybersecurity For Dummies

Cybersecurity For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Cybersecurity For Dummies Cheat Sheet” in the Search box. Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Introduction

About This Book

Foolish Assumptions

Icons Used in This Book

Beyond the Book

Where to Go from Here

Getting Started with Cybersecurity

What Exactly Is Cybersecurity?

Cybersecurity Means Different Things to Different Folks

Cybersecurity Is a Constantly Moving Target

Technological changes

Digital data

The Internet

Cryptocurrency

Mobile workforces and ubiquitous access

Smart devices

Big data

The COVID-19 pandemic

Social shifts

Economic model shifts

Political shifts

Data collection

Election interference

Hacktivism

Greater freedom

Sanctions

New balances of power

Looking at the Risks Cybersecurity Mitigates

The goal of cybersecurity: The CIA Triad

From a human perspective

Getting to Know Common Cyberattacks

Attacks That Inflict Damage

Denial-of-service (DoS) attacks

Distributed denial-of-service (DDoS) attacks

Botnets and zombies

Data destruction attacks

Is That Really You? Impersonation

Phishing

Spear phishing

CEO fraud

Smishing

Vishing

Pharming

Whaling: Going for the “big fish”

Messing around with Other People’s Stuff: Tampering

Captured in Transit: Interception

Man-in-the-middle attacks

Taking What Isn’t Theirs: Data Theft

Personal data theft

Business data theft

Data exfiltration

Compromised credentials

Forced policy violations

Cyberbombs That Sneak into Your Devices: Malware

Viruses

Worms

Trojans

Ransomware

Scareware

Spyware

Cryptocurrency miners

Adware

Blended malware

Zero-day malware

Fake malware on computers

Fake malware on mobile devices

Fake security subscription renewal notifications

Poisoned Web Service Attacks

Network Infrastructure Poisoning

Malvertising

Drive-by downloads

Stealing passwords

Exploiting Maintenance Difficulties

Advanced Attacks

Opportunistic attacks

Targeted attacks

Blended (opportunistic and targeted) attacks

Some Technical Attack Techniques

Rootkits

Brute-force attacks

Injection attacks

Cross-site scripting

SQL injection

Session hijacking

Malformed URL attacks

Buffer overflow attacks

The Bad Guys You Must Defend Against

Bad Guys and Good Guys Are Relative Terms

Bad Guys Up to No Good

Script kiddies

Kids who are not kiddies

Terrorists and other rogue groups

Nations and states

CHINESE FIRMS STEAL AMERICAN INTELLECTUAL PROPERTY

Corporate spies

Criminals

Hacktivists

Terrorists

Rogue insiders

Cyberattackers and Their Colored Hats

How Cybercriminals Monetize Their Actions

Direct financial fraud

Indirect financial fraud

Profiting off illegal trading of securities

Stealing credit card, debit card, and other payment-related information

Stealing goods

Stealing data

Ransomware

Cryptominers

Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats

Human error

Humans: The Achilles’ heel of cybersecurity

Social engineering

External disasters

Natural disasters

Pandemics

Man-made environmental problems

Cyberwarriors and cyberspies

The impotent Fair Credit Reporting Act

Expunged records are no longer really expunged

Social Security numbers

Social media platforms

Google’s all-knowing computers

Mobile device location tracking

Defending against These Attackers

Improving Your Own Personal Security

Evaluating Your Current Cybersecurity Posture

Don’t be Achilles: Identifying Ways You May Be Less than Secure

Your home computer(s)

Your mobile devices

Your Internet of Things (IoT) devices

Your networking equipment

Your work environment

Identifying Risks

UNDERSTANDING ENDPOINTS

Protecting against Risks

Perimeter defense

Firewall/router

Security software

Your physical computer(s) and any other endpoints

Backups

Detecting

Responding

Recovering

Improving

Evaluating Your Current Security Measures

Software

Hardware

Insurance

Education

Privacy 101

Think before you share

Think before you post

General privacy tips

TURNING ON PRIVACY MODE

Banking Online Safely

Safely Using Smart Devices

Cryptocurrency Security 101

Enhancing Physical Security

Understanding Why Physical Security Matters

Taking Inventory

SECRETARY OF STATE HILLARY CLINTON’S EMAIL PROBLEM

Stationary devices

SMARTPHONES ARE A LOT MORE THAN SMART PHONES

Mobile devices

Locating Your Vulnerable Data

Creating and Executing a Physical Security Plan

Implementing Physical Security

Security for Mobile Devices

Realizing That Insiders Pose the Greatest Risks

Cybersecurity Considerations When Working from Home

Network Security Concerns

Device Security Concerns

Location Cybersecurity

Shoulder surfing

Eavesdropping

Theft

Human errors

Video Conferencing Cybersecurity

Keep private stuff out of camera view

Keep video conferences secure from unauthorized visitors

Social Engineering Issues

Regulatory Issues

Protecting Yourself from Yourself

Securing Your Accounts

Realizing You’re a Target

Securing Your External Accounts

Securing Data Associated with User Accounts

Conduct business with reputable parties

Use official apps and websites

Don’t install software from untrusted parties

Don’t root your phone

Don’t provide unnecessary sensitive information

Use payment services that eliminate the need to share credit card numbers

Use one-time, virtual credit card numbers when appropriate

Monitor your accounts

Report suspicious activity ASAP

Employ a proper password strategy

Utilize multifactor authentication

Log out when you’re finished

Use your own computer or phone

Lock your computer

Use a separate, dedicated computer for sensitive tasks

Use a separate, dedicated browser for sensitive web-based tasks

Secure your access devices

Keep your devices up to date

Don’t perform sensitive tasks over public Wi-Fi

Never use public Wi-Fi in high-risk places

Access your accounts only in safe locations

Use appropriate devices

Set appropriate limits

Use alerts

Periodically check access device lists

Check last login info

Respond appropriately to any fraud alerts

Never send sensitive information over an unencrypted connection

Beware of social engineering attacks

Establish voice login passwords

Protect your cellphone number

Don’t click on links in emails or text messages

Securing Data with Parties You’ve Interacted With

Securing Data at Parties You Haven’t Interacted With

Securing Data by Not Connecting Hardware with Unknown Pedigrees

Passwords

Passwords: The Primary Form of Authentication

Avoiding Simplistic Passwords

TOP TEN COMMON PASSWORDS

Password Considerations

Easily guessable personal passwords

Complicated passwords aren’t always better

Different levels of sensitivity

Your most sensitive passwords may not be the ones you think

You can reuse passwords — sometimes

Consider using a password manager

Creating Memorable, Strong Passwords

Knowing When to Change Passwords

Changing Passwords after a Breach

Providing Passwords to Humans

Storing Passwords

Storing passwords for your heirs

Storing general passwords

Transmitting Passwords

Discovering Alternatives to Passwords

Biometric authentication

SMS-based authentication

App-based one-time passwords

Hardware token authentication

USB-based authentication

Preventing Social Engineering Attacks

Don’t Trust Technology More than You Would People

Types of Social Engineering Attacks

Six Principles Social Engineers Exploit

Don’t Overshare on Social Media

A SOCIAL PLATFORM’S ENTIRE DATABASE LEAKS

Your schedule and travel plans

Financial information

Personal information

Information about your children

Information about your pets

Work information

Possible cybersecurity issues

Crimes and minor infractions

Medical or legal advice

Your location

Your birthday

Your “sins”

Leaking Data by Sharing Information as Part of Viral Trends

Identifying Fake Social Media Connections

Photo

Verification

Friends or connections in common

Relevant posts

Number of connections

Industry and location

Similar people

Duplicate contact

Contact details

Premium status

LinkedIn endorsements

Group activity

Appropriate levels of relative usage

Human activities

Cliché names

Poor contact information

Skill sets

Spelling

Age of an account

Suspicious career or life path

Level or celebrity status

DO YOU NEED TO AVOID FAKE CONNECTIONS?

Using Bogus Information

Using Security Software

General Cyberhygiene Can Help Prevent Social Engineering

Cybersecurity for Businesses, Organizations, and Government

Securing Your Small Business

Making Sure Someone Is In Charge

Watching Out for Employees

Incentivize employees

Avoid giving out the keys to the castle

Give everyone separate credentials

Restrict administrators

Limit access to corporate accounts

Implement employee policies

Enforce social media policies

Monitor employees

Dealing with a Remote Workforce

Use work devices and separate work networks

Set up virtual private networks

Create standardized communication protocols

Use a known network

Determine how backups are handled

Be careful where you work remotely

Be extra vigilant regarding social engineering

Considering Cybersecurity Insurance

CYBERSECURITY INSURANCE IS NOW AVAILABLE TO BUSIENSSES OF ALL SIZES

Complying with Regulations and Compliance

Protecting employee data

PCI DSS

Breach disclosure laws

GDPR

HIPAA

Biometric data

Anti-money laundering laws

International sanctions

Handling Internet Access

Segregate Internet access for personal devices

Create bring your own device (BYOD) policies

Properly handle inbound access

Protect against denial-of-service attacks

Use https

Use a VPN

Run penetration tests

Be careful with IoT devices

Use multiple network segments

Be careful with payment cards

Managing Power Issues

LOCKING ALL NETWORKING EQUIPMENT AND SERVERS IN A VENTILATED CLOSET

Cybersecurity and Big Businesses

Utilizing Technological Complexity

Managing Custom Systems

Continuity Planning and Disaster Recovery

Looking at Regulations

Sarbanes Oxley

Stricter PCI requirements

Public company data disclosure rules

Breach disclosures

Industry-specific regulators and rules

Fiduciary responsibilities

INSIDER TRADING AFTER A BREACH OCCURS AND BEFORE IT IS REPORTED

Deep pockets

Deeper Pockets — and Insured

Considering Employees, Consultants, and Partners

Dealing with internal politics

Offering information security training

Replicated environments

Looking at the Chief Information Security Officer’s Role

Overall security program management

Test and measurement of the security program

Human risk management

Information asset classification and control

Security operations

Information security strategy

Identity and access management

Data loss prevention

Fraud prevention

Incident response plan

Disaster recovery and business continuity planning

Compliance

Investigations

Physical security

Security architecture

Geopolitical risks

Ensuring auditability of system administrators

Cybersecurity insurance compliance

Handling a Security Incident (This Is a When, Not an If)

Identifying a Security Breach

Identifying Overt Breaches

Ransomware

Defacement

Claimed destruction

Detecting Covert Breaches

Your device seems slower than before

Your Task Manager doesn’t run

Your Registry Editor doesn’t run

Your device starts suffering from latency issues

Your device starts suffering from communication and buffering issues

Your device’s settings have changed

Your device is sending or receiving strange email messages

Your device is sending or receiving strange text messages

New software (including apps) is installed on your device — and you didn’t install it

Your device’s battery seems to drain more quickly than before

Your device seems to run hotter than before

File contents have been changed

Files are missing

Websites appear different than before

Your Internet settings show a proxy, and you never set one up

Some programs (or apps) stop working properly

Security programs have turned off

An increased use of data or text messaging (SMS)

Increased network traffic

Unusual open ports

Your device starts crashing

Your cellphone bill shows unexpected charges up to here

Unknown programs request access

External devices power on unexpectedly

Your device acts as if someone else were using it

New browser search engine default

Your device password has changed

Pop-ups start appearing

New browser add-ons appear

New browser home page

Your email from the device is getting blocked by spam filters

Your device is attempting to access “bad” sites

You’re experiencing unusual service disruptions

Your device’s language settings changed

You see unexplained activity on the device

You see unexplained online activity

Your device suddenly restarts

You see signs of data breaches and/or leaks

You are routed to the wrong website

Your hard drive or SSD light never seems to turn off

Other abnormal things happen

Recovering from a Security Breach

An Ounce of Prevention Is Worth Many Tons of Response

Stay Calm and Act Now with Wisdom

Bring in a Pro

Recovering from a Breach without a Pro’s Help

Step 1: Figure out what happened or is happening

Step 2: Contain the attack

Step 3: Terminate and eliminate the attack

TERMINATING NETWORK CONNECTIVITY

Boot the computer from a security software boot disk

Backup

Delete junk (optional)

Run security software

Reinstall Damaged Software

Restart the system and run an updated security scan

Erase all potentially problematic System Restore points

Restore modified settings

IN CHROME

IN FIREFOX

IN SAFARI

IN EDGE

Rebuild the system

Dealing with Stolen Information

Paying ransoms

Consult a cybersecurity expert

Consult a lawyer

CYBER LIABILITY INSURANCE AND RANSOMS

Learning for the future

Recovering When Your Data Is Compromised at a Third Party

Reason the notice was sent

Scams

Passwords

Payment card information

Government-issued documents

School or employer-issued documents

Social media accounts

Backing Up and Recovery

Backing Up

Backing Up Is a Must

Backing Up Data from Apps and Online Accounts

SMS texts

Social media

WhatsApp

Google Photos

Other apps

Backing Up Data on Smartphones

Android

Automatic backups

Manual backups

Apple

Backing up to iCloud

Backing up using iTunes

Conducting Cryptocurrency Backups

Backing Up Passwords

Looking at the Different Types of Backups

Full backups of systems

Original system images

Later system images

Original installation media

Downloaded software

Full backups of data

Incremental backups

Differential backups

Mixed backups

Continuous backups

Partial backups

Folder backups

Drive backups

Virtual drive backups

Exclusions

In-app backups

Figuring Out How Often You Should Backup

Exploring Backup Tools

Backup software

Drive-specific backup software

Windows Backup

Smartphone/tablet backup

Manual file or folder copying backups

Automated task file or folder copying backups

Creating a Boot Disk

Knowing Where to Back Up

Local storage

Offsite storage

Cloud

Network storage

Mixing locations

Knowing Where Not to Store Backups

Encrypting Backups

Testing Backups

Disposing of Backups

Resetting Your Device

Exploring Two Types of Resets

Soft resets

Older devices

Windows computers

Mac computers

Android devices

iPhones

Hard resets

Resetting a modern Windows device

METHOD 1

METHOD 2

METHOD 3

Resetting a modern Android device

SAMSUNG GALAXY SERIES RUNNING ANDROID 11

SAMSUNG TABLETS RUNNING ANDROID 11

HUAWEI DEVICES RUNNING ANDROID 8

Resetting a Mac

Resetting an iPhone

Rebuilding Your Device after a Hard Reset

Restoring from Backups

You Will Need to Restore

Wait! Do Not Restore Yet!

Restoring Data to Apps

Restoring from Full Backups of Systems

Restoring to the computing device that was originally backed up

Restoring to a different device than the one that was originally backed up

Original system images

Later system images

Installing security software

Original installation media

Downloaded software

Restoring from full backups of data

Restoring from Incremental Backups

Incremental backups of data

Incremental backups of systems

Differential backups

Continuous backups

Partial backups

Folder backups

Drive backups

Virtual-drive backups

Restoring the entire virtual drive

Restoring files and/or folders from the virtual drive

Dealing with Deletions

Excluding Files and Folders

Understanding Archives

Multiple files stored within one file

Old live data

Old versions of files, folders, or backups

Restoring Using Backup Tools

Restoring from a Windows backup

Restoring to a system restore point

Restoring from a smartphone/tablet backup

Restoring from manual file or folder copying backups

Utilizing third-party backups of data hosted at third parties

Returning Backups to Their Proper Locations

Network storage

Restoring from a combination of locations

Restoring to Non-Original Locations

Never Leave Your Backups Connected

Restoring from Encrypted Backups

Testing Backups

Restoring Cryptocurrency

WHAT IS A DIGITAL WALLET?

Booting from a Boot Disk

Looking toward the Future

Pursuing a Cybersecurity Career

Professional Roles in Cybersecurity

Security engineer

Security manager

Security director

Chief information security officer (CISO)

Security analyst

Security architect

Security administrator

Security auditor

Cryptographer

Vulnerability assessment analyst

Ethical hacker

Security researcher

Offensive hacker

Software security engineer

Software source code security auditor

Security consultant

Security expert witness

Security specialist

Incident response team member

Forensic analyst

Cybersecurity regulations expert

Privacy regulations expert

Exploring Career Paths

Career path: Senior security architect

Career path: CISO

Starting Out in Information Security

Exploring Popular Certifications

CISSP

CISM

CEH

Security+

GSEC

Verifiability

Ethics

Overcoming a Criminal Record

Overcoming Bad Credit

Looking at Other Professions with a Cybersecurity Focus

Emerging Technologies Bring New Threats

Relying on the Internet of Things

Critical infrastructure risks

STUXNET

Computers on wheels: modern cars

Using Cryptocurrencies and Blockchain

Cloud-Based Applications and Data

Optimizing Artificial Intelligence

Increased need for cybersecurity

AI CAN ALREADY FALSIFY MRI IMAGES AND PRODUCE INCORRECT MRI RESULTS

Use as a cybersecurity tool

Use as a hacking tool

Where Was This Laptop Really Made? Supply Chain Risks

Nothing Is Trustworthy: Zero Trust

Genius Computers Are Coming: Quantum Supremacy

Experiencing Virtual Reality

Transforming Experiences with Augmented Reality

POKÉMON GO

The Part of Tens

Ten Ways to Improve Your Cybersecurity without Spending a Fortune

Understand That You Are a Target

Use Security Software

Encrypt Sensitive Information

Back Up Often

Do Not Share Login Credentials

Use Proper Authentication

Use Social Media Wisely

Segregate Internet Access

Use Public Wi-Fi Safely (Or Better Yet, Don’t Use It!)

Hire a Pro

Ten (or So) Lessons from Major Cybersecurity Breaches

Marriott

Target

Sony Pictures

U.S. Office of Personnel Management

Anthem

Colonial Pipeline and JBS SA

Colonial Pipeline

JBS

Ten Ways to Safely Use Public Wi-Fi

Use Your Cellphone as a Mobile Hotspot

Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi

Don’t Perform Sensitive Tasks over Public Wi-Fi

Don’t Reset Passwords When Using Public Wi-Fi

Use a VPN Service

Use Tor

Use Encryption

Turn Off Sharing

Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks

Understand the Difference between True Public Wi-Fi and Shared Wi-Fi

Index. A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

Z

About the Author

Dedication

Author’s Acknowledgments

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

In the course of just a single generation, the world has undergone some of the greatest changes since the dawn of mankind. The availability of the Internet as a tool for consumers and businesses alike, coupled with the invention of mobile devices and wireless networking, have ushered in an Information Revolution that has impacted just about every aspect of human existence.

Humanity’s reliance on technology, however, has also created enormous risks. It seems that not a day goes by without some new story emerging of a data breach, cyberattack, or the like. Simultaneously, because society’s reliance on technology increases on a daily basis, the potential adverse consequences of cyberattacks have grown exponentially to the point that people can now lose their fortunes, their reputations, their health, or even their lives, as the result of cyberattacks.

.....

Furthermore, the world of cybersecurity created a tremendous imbalance between attackers and defenders that works to the advantage of less powerful nations.

Governments that could never afford to launch huge barrages against an adversary in the physical world can easily do so in the world of cyber, where launching each attack costs next to nothing. As a result, attackers can afford to keep attacking until they succeed — and they need to breach systems only once to “succeed” — creating a tremendous problem for defenders who must shield their assets against every single attack. This imbalance has translated into a major advantage for attackers over defenders and has meant that even minor powers can successfully breach systems belonging to superpowers.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Cybersecurity For Dummies
Подняться наверх