Cybersecurity For Dummies. Joseph Steinberg

Чтение книги онлайн.

Читать онлайн книгу Cybersecurity For Dummies - Joseph Steinberg страница 10

Cybersecurity For Dummies - Joseph Steinberg

Скачать книгу

margins. These icons mark important tidbits of information:

      

The Tip icon identifies places where I offer additional tips for making this journey more interesting or clear. Tips cover some neat shortcuts that you may not have known about.

      

The Remember icon bookmarks important points that you'll want to keep in mind.

      

The Warning icon helps protect you from common errors and may even give you tips to undo your mistakes.

      In addition to what you’re reading right now, this product also comes with a free access-anywhere Cheat Sheet that covers important cybersecurity actions. To get this Cheat Sheet, simply go to www.dummies.com and search for Cybersecurity For Dummies Cheat Sheet in the Search box.

      Cybersecurity For Dummies is designed in such a fashion that you don’t have to read the book in order or even read the entire book.

      If you purchased this book because you suffered a cybersecurity breach of some sort, for example, you can skip to the chapters in Part 5 without reading the prior material (although reading it afterwards may be wise, as it may help you prevent yourself from becoming the victim of another cyberattack).

      Getting Started with Cybersecurity

      Discover what cybersecurity is and why defining it is more difficult than you might expect.

      Find out why breaches seem to occur so often and why technology alone does not seem to stop them.

      Learn how societal changes can dramatically impact cybersecurity.

      Explore various types of common cyberthreats and common cybersecurity tools.

      Understand the who, how, and why of various types of attackers and threatening parties that aren’t officially malicious.

      What Exactly Is Cybersecurity?

      IN THIS CHAPTER

      

Understanding the difference between cybersecurity and information security

      

Showing why cybersecurity is a constantly moving target

      

Understanding the goals of cybersecurity

      

Looking at the risks mitigated by cybersecurity

      To improve your ability to keep yourself and your loved ones cybersecure, you need to understand what cybersecure means, what your goals should be vis-à-vis cybersecurity, and what exactly you’re securing against.

      While the answers to these questions may initially seem simple and straightforward, they aren’t. As you see in this chapter, these answers can vary dramatically between people, company divisions, organizations, and even within the same entity at different times.

      Typically, for example:

       For individuals, cybersecurity means that their personal data is not accessible to anyone other than themselves and others they have authorized, and that their computing devices work properly and are free from malware.

       For small business owners, cybersecurity may include ensuring that credit card data is properly protected and that standards for data security are properly implemented at point-of-sale registers.

       For firms conducting online business, cybersecurity may include protecting servers that untrusted outsiders regularly interact with.

       For shared service providers, cybersecurity may entail protecting numerous data centers that house numerous servers that, in turn, host many virtual servers belonging to many different organizations.

       For the government, cybersecurity may include establishing different classifications of data, each with its own set of related laws, policies, procedures, and technologies.

      

The bottom line is that while the word cybersecurity is easy to define, the practical expectations that enters people’s minds when they hear the word vary quite a bit.

      Technically speaking, cybersecurity is the subset of information security that addresses information and information systems that store and process data in electronic form, whereas information security encompasses the security of all forms of data (for example, securing a paper file and a filing cabinet).

      That said, today, many people colloquially interchange the terms, often referring to aspects of information security that are technically not part of cybersecurity as being part of the latter. Such usage also results from the blending of the two in many situations. Technically speaking, for example, if someone writes down a password on a piece of paper and leaves the paper on a desk where other people can see the password instead of placing the paper in a safe deposit box or safe, that person has violated a principle of information security, not of cybersecurity, even though those actions may result in serious cybersecurity repercussions.

      While the ultimate goal of cybersecurity may not change much over time, the policies, procedures, and technologies used to achieve it change dramatically as the years march on. Many approaches and technologies that were more than adequate to protect consumers’ digital data in 1980, for example, are effectively worthless today, either because they’re no longer practical to employ or because technological

Скачать книгу