相關主題
商品描述
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems.
Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage.
Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed.
What You'll Learn
- Discover how computer security works and what it can protect us from
- See how a typical hacker attack works
- Evaluate computer security threats to the individual user and corporate systems
- Identify the critical vulnerabilities of a computer connected to the Internet
- Manage your computer to reduce vulnerabilities to yourself and your employer
- Discover how the adoption of newer forms of biometric authentication affects you
- Stop your router and other online devices from being co-opted into disruptive denial of service attacks
商品描述(中文翻譯)
探索針對各種計算設備個別使用者的最普遍網路威脅。本書教您防禦最佳實踐和可用的最先進工具,以抵禦每一種威脅。
個人網路安全 針對工作和家庭中的個別使用者需求。本書涵蓋所有個人計算模式的個人網路安全,無論是在消費者購買的設備還是公司發放的設備上:桌上型電腦、筆記型電腦、行動設備、智慧電視、WiFi 和藍牙周邊設備,以及嵌入網路連接感測器的物聯網物件。在所有這些模式中,針對個別使用者的網路攻擊頻率、強度和複雜性隨著惡意軟體和網路犯罪交付系統的加速變異率而不斷增加。
傳統的防毒軟體和個人防火牆已無法保證個人安全。忽視學習和採用新方法來保護自己在工作和私人環境中的使用者,將使自己、同事和公司面臨不便、違規、聲譽損害、數據損壞、數據盜竊、系統降級、系統毀壞、財務損失和犯罪災難的風險。本書展示了應採取的行動,以限制損害並從損失中恢復。
與其制定一套「你不應該」的規則,這些規則有太多例外和應急情況而無法實際使用,雲端專家 Marvin Waschke 為您提供戰場情報、戰略理解、生存訓練和經過驗證的工具,讓您能夠智能地評估環境中的安全威脅,並最有效地保護自己免受攻擊。通過啟發性的範例和情境,作者向您展示如何根據自己的特定情況調整和應用最佳實踐,如何自動化和常規化您的個人網路安全,如何識別安全漏洞並迅速採取行動封堵它們,以及如何在攻擊成功時恢復損失和恢復功能。
您將學到什麼
- 了解計算機安全如何運作以及它可以保護我們免受什麼威脅
- 了解典型黑客攻擊的運作方式
- 評估對個別使用者和企業系統的計算機安全威脅
- 識別連接到互聯網的計算機的關鍵漏洞
- 管理您的計算機以減少對您和您的雇主的漏洞
- 了解新型生物識別認證的採用如何影響您
- 防止您的路由器和其他在線設備被利用進行破壞性的拒絕服務攻擊