What You Should Know About Cybersecurity
65 pages
English

Vous pourrez modifier la taille du texte de cet ouvrage

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

What You Should Know About Cybersecurity , livre ebook

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
65 pages
English

Vous pourrez modifier la taille du texte de cet ouvrage

Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

The Simply Said series offers balanced views and reliable explanations on complex issues in several categories. Leading authorities provide clear, concise, and up-to-date information to simplify even the most complicated subjects for general readers. Perfect for students, professionals and inquisitive individuals.
In What You Should Know About Cybersecurity, key terms relating to this vast field are defined and explored. Case studies and their implications are presented to provide context of how cybersecurity can affect people in their personal and professional lives.

Sujets

Informations

Publié par
Date de parution 12 octobre 2022
Nombre de lectures 0
EAN13 9789927161070
Langue English
Poids de l'ouvrage 2 Mo

Informations légales : prix de location à la page 0,0500€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

Contents
Introduction
Chapter 1
Cybersecurity and Cybercrime Terminology - Most Common Technical Terms
Chapter 2
Different Hacking Group Threats
Chapter 3
System Security Threats
Chapter 4
Password Security
Chapter 5
Viruses and Malware
Chapter 6
Email Security
Chapter 7
Internet Security
Chapter 8
Famous Cyberattacks
Chapter 9
Wireless Security
Chapter 10
Identity Fraud and Theft
Chapter 11
Social Engineering
Chapter 12
Backup and Recovery
Chapter 13
Cyber Warfare vs. Electronic Warfare
Chapter 14
The Chinese Model
Conclusion and Takeaways
References


Introduction
This book is an introduction to cybersecurity , intended to help the general public understand the importance of this ever-expanding field. The topic has become increasingly relevant as cyberattacks intensify around the globe.
The subject will be discussed in general terms, since the technologies, tools, policies and processes associated with cybersecurity have become increasingly complex. The average computer user is still baffled by the ability of hackers to take control of digital devices, such as laptops, iPads, mobile phones and the IoT (‘Internet of Things’). In general, people do not understand what they have done wrong. It is even harder to explain to them how it happened. The majority shake their heads and consider cyberattacks to be irrelevant to their daily lives. They feel that they do not have any sensitive information stored in their devices relevant to hackers. The majority even believe that hackers and cyberattackers only target people in a sensitive position or those in government. For the average person, an attempt on their digital device to obtain information is not important, so ignorance plays a significant role in making the job of hackers easy.
The general public does not realize that all digital media, especially laptops and mobiles, contain personal information (documents, pictures, videos, email, text messages, etc.) which can be copied, transferred or stolen. Such private information can be used as a bargaining chip for ransom, threats, intimidation, fraud and other types of cybercrime. There are many cases of people falling prey to phishing emails and identification fraud which have caused them emotional and financial stress. Such valuable personal and financial information should be protected at all costs and by any means. Once they are out in cyberspace, no one can predict how those involved in organized crime and groups of hackers will utilize them criminally and illegally.
This book will shed light on various key subjects linked to cybersecurity and cybercrime, such as the multiple definitions and terminologies commonly used by the public, as well as standard technical terms, different cyber threats, password security, viruses and malware, email security, Internet security , computer security, physical security, wireless security, identity theft, social engineering , and backup and recove ry.
As the topic of cybersecurity and cybercrime is vast and limitless, it will not be covered in depth. This book acts as an introduction to this broad topic and readers are encouraged to engage in further research, using the various references available in cyberspace.
Cybercrime is a daily threat to our way of life, both on a personal and a global scale. Current cyberattacks on various countries’ infrastructures remind us all that without such foundations, our comfortable daily lifestyle cannot continue. Current technologies and the evolution of social media have enabled hackers of various types to threaten not only our freedom but also our everyday life as we know it.
Cybersecurity has become national security for all nations. It poses a threat to infrastructures, especially security and the military establishment. How nations are attacking other countries by utilizing their advanced cybersecurity tools is explored in this book, including the Stuxnet virus attack on Iranian nuclear facilities; attacks on water and electrical grids and networks; social media affecting elections and the media, such as the attack on the Qatar National Broadcasting Agency; attacks on financial systems and the disabling of various infrastructures in countries such as Estonia and the Ukraine. These examples will be highlighted to show readers the seriousness of cyberattacks, especially in smaller nations. Countries with advanced cybersecurity are fighting each other, utilizing the latest technological tools in their arsenals. Cyber espionage on security and military establishments is not only a daily occurrence, but it also happens at commercial and industrial sites across the world. Countries which do not have research and development (R&D) capabilities have resorted to cyber espionage to steal industrial blueprints and intellectual property, saving themselves from having to invest and spend millions of dollars on R&D.
Thus, cybersecurity has become an important topic amongst decision makers in government and the private sector. Cybercrime is ranked as the number one threat to businesses and protection must be provided at all costs. The subjects of cybersecurity and cybercrime have become more important, given the proliferation of identity fraud and email phishing, utilizing social engineering and social media applications. Hackers working either individually or with gangs have infiltrated users’ accounts. They can access reports in multiple ways and post them for sale on the Dark Web . Many businesses realize their systems have been hacked after users’ credentials are posted in cyberspace. Such accounts are then used to blackmail or ransom individuals and business entities across the globe. With various devices nowadays connected to the Internet, it has become easy for hackers to obtain passwords and security pins to launch attacks not only locally but internationally.
This book will touch on the above issues and attempt to educate readers about the danger of cybercrime and the security levels required to enhance the safety and integrity of their digital devices and systems.


Chapter 1
Cybersecurity and Cybercrime Terminology - Most Common Technica l Terms
Five years ago, cybersecurity and cybercrime terminology were not familiar to the general public. However, since then, many users of digital devices have been harmed by hackers illegally accessing their private information and as a result, more people have become acquainted wit h them.
But still, when asked what cybersecurity is, many people understand it as a mixture of terms linked to security, the Internet, hacking, loss of data and others. There is no unified understanding of the definition of these essential terms and there is still confusion between information security and cybersecurity. Although the two terms are closely connected in their operations and with regards to safety, the public und erstands them to mean the security of physical computers and digital devices. It is essential for a novice to understand certain cybersecurity terms, which have become common in cyberattack incidents.
Here is a list of the most pertinent terminology relating to the field for the non-specialist reader.
Adware . The term is used generally to mean that certain viruses and worms are launched when an individual clicks on an advertisement appearing on a digital device. Most of these types of attacks use fake ads intended to launch malware into target systems. With the popularity of social media applications and the increasing flood of advertisements on Facebook, Instagram, Telegram, Twitter and the like, the number of people affected by adware is growing considerably.
Anti-Virus . This software system sold by cybersecurity companies and software developers is installed on digital devices to identify, prevent and clean devices of all viruses and worms. There are various levels of development with regards to capabilities, and the more advanced an anti-virus system is, the higher the cost, but it is essential as the first front line of defense.
APT (Advanced Persistent Threats ) . This is now a popular term that describes those hackers with advanced persistent capabilities. Nation states and criminal groups who possess advanced tools and hacking technologies are characterized as APT. When such a hacking has occurred, it is challenging to discover the source. Viruses and worms launched by APT can stay hidden for longer periods. APT hackers can cause severe damage to targeted assets.
Assets . Refers to targeted digital devices’ assets in cyberattacks. They also represent victims’ assets, whatever they may be.
Authentication . The process of ensuring that the owner of an account has the legal authority to access it and the account is not being accessed by an unknown individual. Authentication can be two-factor based on user identification and a password, or three-factor. In three-factor authentication, there is an additional level of security identification of the user. This might be a digital PIN or a series of private questions to individuals. There are also other advanced forms of authentication, such as biometric identification.
Authorization . Refers to the legal right of access into a system and specific applications. A user can be authorized to access the human resource module of the software system but not financial records — such authorization may be given by the network administrator or database manager.
Availability . Information transmitted, received, stored and retrieved should be available to the custodian/owner at all times. Compromising available data is a significant concern to decision makers dealing with cyberspace.
Backdoor . A term used in the cybersecurity world to mean the ability of hackers to install a worm capable of re-e

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents