• Complain

Cox - Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity

Here you can read online Cox - Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, genre: Religion. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Cox Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity
  • Book:
    Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity
  • Author:
  • Genre:
  • Year:
    2019
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cox: author's other books


Who wrote Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity? Find out the surname, the name of the author of the book and a list of all author's works by series.

Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Everyday

Cybersecurity

Everyday

Cybersecurity

A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity.

Christopher K. Cox

Cover by Stephen C. Cox

Edited by Kaitlyn S. Hedges.

Copyright 2019 Christopher K. Cox. All rights reserved.


No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in reviews and certain other non-commercial uses permitted by copyright law.

eBook ISBN-13: 978-1-7330186-1-6

Dedication


First, and foremost, this book is dedicated to my wonderful wife, Esther. She has listened to me for years about my desire to write books. When the opportunity for this book came up, she was supportive and encouraging, even when the book consumed Saturdays, evenings, and some vacation time to complete. She is my biggest cheerleader.

This is also dedicated to my parents, who stoked my initial desires to write by reading my first books, way back in second grade. While I liked writing, they planted the seed of becoming a published author.

Acknowledgements


A big thanks goes to my brother, Steve, who created the cover for this book. When I talked to him about what I was looking for, he came up with this look, which is better than what I was thinking of.

I also want to acknowledge the hard work of my editor, Kaitlyn Hedges. She took my work and polished it up. Her eye for detail definitely caught things I had missed. I did add some things after she finished, so I may have introduced more errors.

Finally, I need to express my appreciation to the professors in my masters of cybersecurity program: Robert M. Jorgensen, Basil Hamdan, and C. Paul Morrey. They expanded on my previous experience and knowledge, and introduced me to new ones. Professor Jorgensen was particularly encouraging of this book.

Contents

Chapter 1:

Chapter 2:

Chapter 3:

Chapter 4:

Chapter 5:

Chapter 6:

Chapter 7:

Chapter 8:

Chapter 9:

Chapter 10:

Chapter 11:

Chapter 12:

Chapter 13:

Chapter 14:

Chapter 15:

Chapter 16:

Chapter 17:

Appendix A:

Appendix B:

Appendix C:

Authors Foreword

A couple of years after I started working as an IT technician, I began an undergraduate program in information systems. One of the classes I took was on information security. The topic intrigued me.

At the time, I was fairly new as the IT expert in my department. There were times during those first years when blank stares were returned as I tried to explain something, usually because Id use the technical terminology I was learning in classes. To me, I sounded like I knew what I was doing. Even in my writing, such as emails to staff, I often used the more technical terms. It took some time for me to realize I wasnt helping anyone with the techno-talk.

One of my directors told me, on more than one occasion, I needed to remember that most of the people I worked with were used to big buttons to push and levers to pull. It was his way of telling me to keep things simple and communicate at a level others understand.

Im not perfect at it, but Ive gotten better over 10+ years at learning to simplify techno-jargon.

One of my recurring thoughts over the years, especially during my masters program, has been how I can better help non-technical people be more security minded, without being too technical. Sometimes the technical terms are needed and need to be understood. However, too often people get lost in the alphabet-soup of acronyms and terminology.

When it comes to security, people are generally the weakest link, the most susceptible to failure, and the most likely to facilitate a data breach (often unintentionally). That is where the seeds to this book started.

My main intent with this book is to focus on the most important parts of cybersecurity, increase your awareness, and help you on your path to better security and data privacy. Its not an end-all discussion in cybersecurity, nor will it cover every aspect of cybersecurity.

As we go through the information, you may be surprised by the number of physical security practices discussed. Keep in mind, our real, physical lives are greatly affected by our virtual security, and physical security practices can also affect our cybersecurity.

Whenever possible, I have tried to use generic identifiers when referring to a person, such as a hacker. However, unless referring to a specific individual, I will sometimes use he or she interchangeably.

What you read and apply in your digital (and even physical) world can make your personal security stronger. To further strengthen your own and others cyber identity, I suggest taking what you learn and sharing it with othersfamily, friends, coworkers.

Helping others become more security conscious also helps protect your data, particularly if any of your family, friends, or coworkers have access to any part of your digital identity, including social media, email, and other web locations. Increasing their security awareness and practices strengthens the security chain that keeps your data safer.

If you do find this book helpful, please let others know by telling them about it and leaving a review.

Who Is This Book for?

This book is not a textbook or filled with techno-jargon. Tech terms will be used, but Ill try to explain them in simple, common language. My goal is to provide you with an essential, foundational understanding of cybersecurity.

This book is specifically for non-technical users who want to increase the security of their personal information. Its not necessarily a how-to book because computers, devices, and programs are constantly changing, and theres no way a single book could cover every cybersecurity scenario. Its more of the what and why behind cybersecurity, and having better security awareness.

However, this book can also be useful for technical users. Technical users who may find this book useful include those who:

  • Dont know much about cybersecurity and want to gain a better understanding of security issues.

  • Want to share an easy-to-understand cybersecurity awareness resource.

  • Need help speaking at a commonly understood level.

Most of the people I know are non-technical users. By this, I mean they use computers, but they arent IT people. Beyond installing a program by clicking Next, Next, and Finish and maybe customizing their computer with a background and some personalization, theyre unfamiliar with configuring systems and troubleshooting problems.

In over 11 years of technical support, Ive found most people would actually like to solve their own problems. Most want to be more cyber-aware and secure. Many think theyre dumb, but in my experience, we could all be considered dummies in something, but nobody wants to be dumb.

We need someone to talk in a language we understand and guide us through the process of understanding the unfamiliar. I can learn something from anyone, and Ill probably feel dumb when Im learning from someone elses expertise.

Ive seen eyes glaze over when an IT person speaks techno-talk to a non-technical user. Users would rather the IT expert take over in solving a computer problem because they believe most computer problems are too difficult to fix. And, most IT people just take over, because its easier and quicker for everyone.

Unfortunately, while it is easier for the tech to do this, it also perpetuates the idea that regular computer users arent able, or smart enough, to do things themselves.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity»

Look at similar books to Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity»

Discussion, reviews of the book Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.