• Complain

H James - The Pocket Guide to Cyber Security

Here you can read online H James - The Pocket Guide to Cyber Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Usha D & James H, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    The Pocket Guide to Cyber Security
  • Author:
  • Publisher:
    Usha D & James H
  • Genre:
  • Year:
    2020
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

The Pocket Guide to Cyber Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Pocket Guide to Cyber Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

H James: author's other books


Who wrote The Pocket Guide to Cyber Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Pocket Guide to Cyber Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Pocket Guide to Cyber Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
The Pocket Guide to Cyber Security
Usha D & James H
Table of Contents
THE POCKET GUIDE TO CYBER SECURITY
About the guide
This guide is aimed at an individual who is reasonably familiar with the basics of computing i.e. they know how to use a computer and the Internet well enough to make basic changes to settings on their computer. This guide is not intended as an in-depth technical guide. Instead, its aim is to provide some guidance for the average person who wants to improve upon their cyber security.
The information provided in this guide will allow the average computer user to assess their current cyber security situation and either directly improve their cyber security (i.e. configure their digital devices so that these are secure) or ask the right questions to an expert/forum/search engine if they are not confident about tackling the settings by themselves.
What is cyber security and why should I care about it.
To many people, cyber security (aka information security or digital security) is a bit mysterious. It is something that many associate with Hollywood movies about spies and international espionage efforts by powerful and shadowy forces.
The reality is much more mundane. Cyber security is about protecting your digital information and data from accidental loss (i.e. dropping your laptop and smashing the hard drive) or theft/modification by everyday criminals (in most cases) not criminal masterminds.
It is also worth noting that your information won't necessarily be stolen by a hacker', because a hacker (in the computer world) is someone who uses their skill with computers to overcome a problem. That problem may be attempting to get past or compromise a security system but this is also done by professionals with the aim of improving cyber security by finding out where security is weak and coming up with ways to strengthen it.
So, we won't use the term hacker here for our bad guy, we will use the term cyber crook or cyber thief. Note: the cyber security industry tends to use the term adversary, but we think cyber crook is more descriptive.
The aim of cyber security is to protect your digital information or data. Although the specific information or data that you would want to protect can vary, it could include:
  • Letters to and from family and loved ones.
  • Official documents that could be used to identify you i.e. your passport or birth certificate.
  • It could be your credit card number and pin, or login details for your online bank accounts.
  • It could be financial records or personal records that describe and prove your identity (or other peoples identity if you have their information on your computer).
  • It could be photos of you or your children.
In short, if it is information that you do not want anyone else to have, you should protect it.
Cyber security is perhaps less understood than home security (for example) because information doesn't feel quite as real to most people as home valuables. Everyone intuitively understands the need to lock up the house when you go somewhere; to protect the contents of the home from theft. But locking the digital door to your personal information is a bit more of a murky concept for most people. It is important to see your personal data and information as your property; it has value and it is worth protecting.
The people who would steal your digital property are not geniuses (although they are probably brighter than the average crook). They operate like a common thief, they look for a soft target or an easy opening to access your data and try to see what and how much they can get.
Poor cyber behaviour on your behalf is the digital equivalent of announcing to the world that you are going on a long overseas holiday. And how easy it is to gain access to your house; all crooks look for poor security and easy targets.
It is the aim of this guide to arm you with the information to make yourself a difficult target for cyber crooks, who often rely on ignorance about cyber security to steal your data. By the end of this guide, you will know enough to implement cyber security measures that will deter the average cyber crook, who will put you in the too-difficult basket and move on to easier pickings.
We will now look at the ten main areas of focus in cyber security, these areas are used by businesses and governments when they are designing their cyber security strategy but they equally apply to the household. Let's take a look at the ten areas of focus for cyber security.
The ten areas of focus for cyber security
We will discuss how you can improve your cyber security in each of these ten areas in greater detail in the coming chapters, but first let's get sense of what these ten areas are:
Focus 1: Important Data
Important Data: determining what data or information is important for you to protect and how it should be protected.
If you feel confused about what type of data/information you should classify as important then ask yourself; if I lost this information or something happened to change its accuracy or its currency, does this matter to me?
Here are some obvious examples of important data to help start your thinking:
  • Pictures and video: Do you want your family photos to be lost or falling into the wrong hands? This used to be the first thing people wanted to save in a fire when photos were of the paper variety. Photos are memories and memories are considered highly valuable by most people.
  • Work/assignments: What if you lost the novel you were working on, a big assignment or sensitive work information? Imagine how you would feel if it had been stolen and placed out there on the web?
  • List of contacts: Imagine if you lost your collection of contact details, such as phone numbers; it would be a big task to get them all back, if it is at all even possible.
  • Financial information: Being audited by the tax offices is no joke and it is seriously not funny if you lose all your tax receipts or previous tax returns. If you have other peoples financial data, it is imperative you protect it.
  • Identity information: Cyber crooks can take your personal details and if they have enough information, they can mimic your identity. Identity theft is quite sophisticated and hard for other organisations to detect early enough, especially if the identity thief is good at covering their tracks. Your best protection is to secure your identity information (such as your passport or drivers license) so that the cyber crook has too many gaps in your personal information to avoid suspicion when they try to impersonate you. This also applies to other peoples identity if you have their personal information.
These are just a few main examples of important data to help you to get the picture. If you would be screaming to the sky why didn't I back this up or protect this the moment it is gone, back it up (we will discuss how to do that in chapter 5). AND protect it.
Another useful habit to get into whenever you are saving a file or accessing information is to ask yourself the question, does this information matter to me? And if someone got hold of this information, could they make my life difficult, ruin my life or would it be no big deal?
Then ask yourself: how am I protecting this information? Or how is it being protected by the service that Im choosing to use (i.e. Cloud storage)? If you are unsure about the answers to any of these questions, ask to find out and make sure you are happy with the answers.
How do we protect information?
Whether it is information in electronic or hardcopy form, if it matters to you, it should be carefully stored and protected; so that people (e.g. your kids messing around with your computer or a cyber crook) are unable to: get access to, modify or use your information in any manner (in more technical terms, this is called protecting the confidentiality, integrity and availability of the information).
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Pocket Guide to Cyber Security»

Look at similar books to The Pocket Guide to Cyber Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Pocket Guide to Cyber Security»

Discussion, reviews of the book The Pocket Guide to Cyber Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.