Cybersecurity For Dummies. Joseph Steinberg
Чтение книги онлайн.
Читать онлайн книгу Cybersecurity For Dummies - Joseph Steinberg страница 2
6 Part 2: Improving Your Own Personal Security Chapter 4: Evaluating Your Current Cybersecurity Posture Don’t be Achilles: Identifying Ways You May Be Less than Secure Identifying Risks Protecting against Risks Evaluating Your Current Security Measures Privacy 101 Banking Online Safely Safely Using Smart Devices Cryptocurrency Security 101 Chapter 5: Enhancing Physical Security Understanding Why Physical Security Matters Taking Inventory Locating Your Vulnerable Data Creating and Executing a Physical Security Plan Implementing Physical Security Security for Mobile Devices Realizing That Insiders Pose the Greatest Risks Chapter 6: Cybersecurity Considerations When Working from Home Network Security Concerns Device Security Concerns Location Cybersecurity Video Conferencing Cybersecurity Social Engineering Issues Regulatory Issues
7 Part 3: Protecting Yourself from Yourself Chapter 7: Securing Your Accounts Realizing You’re a Target Securing Your External Accounts Securing Data Associated with User Accounts Securing Data with Parties You’ve Interacted With Securing Data at Parties You Haven’t Interacted With Securing Data by Not Connecting Hardware with Unknown Pedigrees Chapter 8: Passwords Passwords: The Primary Form of Authentication Avoiding Simplistic Passwords Password Considerations Creating Memorable, Strong Passwords Knowing When to Change Passwords Changing Passwords after a Breach Providing Passwords to Humans Storing Passwords Transmitting Passwords Discovering Alternatives to Passwords Chapter 9: Preventing Social Engineering Attacks Don’t Trust Technology More than You Would People Types of Social Engineering Attacks Six Principles Social Engineers Exploit Don’t Overshare on Social Media Leaking Data by Sharing Information as Part of Viral Trends Identifying Fake Social Media Connections Using Bogus Information Using Security Software General Cyberhygiene Can Help Prevent Social Engineering
8 Part 4: Cybersecurity for Businesses, Organizations, and Government Chapter 10: Securing Your Small Business Making Sure Someone Is In Charge Watching Out for Employees Dealing with a Remote Workforce Considering Cybersecurity Insurance Complying with Regulations and Compliance Handling Internet Access Managing Power Issues Chapter 11: Cybersecurity and Big Businesses Utilizing Technological Complexity Managing Custom Systems Continuity Planning and Disaster Recovery Looking at Regulations Deeper Pockets — and Insured Considering Employees, Consultants, and Partners