Cybersecurity For Dummies Front Cover

Cybersecurity For Dummies

  • Length: 368 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2019-10-15
  • ISBN-10: 1119560322
  • ISBN-13: 9781119560326
  • Sales Rank: #8758 (See Top 100 Books)
Description

Protect your business and family against cyber attacks

Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being “cyber-secure” means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.

If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!

  • The who and why of cybersecurity threats
  • Basic cybersecurity concepts
  • What to do to be cyber-secure
  • Cybersecurity careers
  • What to think about to stay cybersecure in the future

Now is the time to identify vulnerabilities that may make you a victim of cyber-crime ― and to defend yourself before it is too late.

Table of contents

Part 1 Getting Started with Cybersecurity
Chapter 1 What Exactly Is Cybersecurity?
Chapter 2 Getting to Know Common Cyberattacks
Chapter 3 Bad Guys and Accidental Bad Guys: The Folks You Must Defend Against

Part 2 Improving Your Own Personal Security
Chapter 4 Evaluating Your Current Cybersecurity Posture
Chapter 5 Enhancing Physical Security

Part 3 Protecting Yourself from Yourself
Chapter 6 Securing Your Accounts
Chapter 7 Passwords
Chapter 8 Preventing Social Engineering

Part 4 Cybersecurity for Businesses and Organizations
Chapter 9 Securing Your Small Business
Chapter 10 Cybersecurity and Big Businesses

Part 5 Handling a Security Incident (This Is a When, Not an If)
Chapter 11 Identifying a Security Breach
Chapter 12 Recovering from a Security Breach

Part 6 Backing Up and Recovery
Chapter 13 Backing Up
Chapter 14 Resetting Your Device
Chapter 15 Restoring from Backups

Part 7 Looking toward the Future
Chapter 16 Pursuing a Cybersecurity Career
Chapter 17 Emerging Technologies Bring New Threats

Part 8 The Part of Tens
Chapter 18 Ten Ways You Can Improve Your Cybersecurity without Spending a Fortune
Chapter 19 Ten Lessons from Major Cybersecurity Breaches
Chapter 20 Ten Ways to Safely Use Public Wi-Fi

To access the link, solve the captcha.