Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Joseph Steinberg
Cybersecurity For Dummies
Читать книгу Cybersecurity For Dummies - Joseph Steinberg - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
132
Оглавление
Купить и скачать книгу
Вернуться на страницу книги Cybersecurity For Dummies
Оглавление
Страница 1
Страница 2
Cybersecurity For Dummies® To view this book's Cheat Sheet, simply go to
www.dummies.com
and search for “Cybersecurity For Dummies Cheat Sheet” in the Search box. Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Страница 8
Страница 9
Страница 10
What Exactly Is Cybersecurity?
Cybersecurity Means Different Things to Different Folks
Cybersecurity Is a Constantly Moving Target
Technological changes
Digital data
The Internet
Cryptocurrency
Mobile workforces and ubiquitous access
Smart devices
Big data
The COVID-19 pandemic
Social shifts
Economic model shifts
Political shifts
Data collection
Election interference
Hacktivism
Greater freedom
Sanctions
New balances of power
Looking at the Risks Cybersecurity Mitigates
The goal of cybersecurity: The CIA Triad
From a human perspective
Страница 34
Getting to Know Common Cyberattacks
Attacks That Inflict Damage
Denial-of-service (DoS) attacks
Distributed denial-of-service (DDoS) attacks
Botnets and zombies
Data destruction attacks
Is That Really You? Impersonation
Phishing
Spear phishing
CEO fraud
Smishing
Vishing
Pharming
Whaling: Going for the “big fish”
Messing around with Other People’s Stuff: Tampering
Captured in Transit: Interception
Man-in-the-middle attacks
Taking What Isn’t Theirs: Data Theft
Personal data theft
Business data theft
Data exfiltration
Compromised credentials
Forced policy violations
Cyberbombs That Sneak into Your Devices: Malware
Viruses
Worms
Trojans
Ransomware
Scareware
Spyware
Cryptocurrency miners
Adware
Blended malware
Zero-day malware
Fake malware on computers
Fake malware on mobile devices
Fake security subscription renewal notifications
Poisoned Web Service Attacks
Network Infrastructure Poisoning
Malvertising
Drive-by downloads
Stealing passwords
Exploiting Maintenance Difficulties
Advanced Attacks
Opportunistic attacks
Targeted attacks
Blended (opportunistic and targeted) attacks
Some Technical Attack Techniques
Rootkits
Brute-force attacks
Injection attacks
Cross-site scripting
SQL injection
Session hijacking
Malformed URL attacks
Buffer overflow attacks
Страница 91
The Bad Guys You Must Defend Against
Bad Guys and Good Guys Are Relative Terms
Bad Guys Up to No Good
Script kiddies
Kids who are not kiddies
Terrorists and other rogue groups
Nations and states
CHINESE FIRMS STEAL AMERICAN INTELLECTUAL PROPERTY
Corporate spies
Criminals
Hacktivists
Terrorists
Rogue insiders
Cyberattackers and Their Colored Hats
How Cybercriminals Monetize Their Actions
Direct financial fraud
Indirect financial fraud
Profiting off illegal trading of securities
Stealing credit card, debit card, and other payment-related information
Stealing goods
Stealing data
Ransomware
Cryptominers
Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
Human error
Humans: The Achilles’ heel of cybersecurity
Social engineering
External disasters
Natural disasters
Pandemics
Man-made environmental problems
Cyberwarriors and cyberspies
The impotent Fair Credit Reporting Act
Expunged records are no longer really expunged
Social Security numbers
Social media platforms
Google’s all-knowing computers
Mobile device location tracking
Defending against These Attackers
Страница 131
{buyButton}
Подняться наверх