Coverart for item
The Resource Digital Defense : A Cybersecurity Primer

Digital Defense : A Cybersecurity Primer

Digital Defense : A Cybersecurity Primer
Digital Defense
Title remainder
A Cybersecurity Primer
Cataloging source
Literary form
non fiction
Nature of contents
Digital Defense : A Cybersecurity Primer
Digital Defense : A Cybersecurity Primer
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Carrier category
online resource
Carrier category code
Carrier MARC source
Content category
Content type code
Content type MARC source
  • Dedication -- Preface -- Acknowledgements -- Contents -- 1: What Is at Stake? What Should You Do? Why Should You Care? -- Houston, Texas, and the "Hacked Baby Cam" in the Nursery -- The Sum of 22,000 lb Transferred from Elderly Mother's Bank Account in London, England -- Couple Sentenced for False Tax Refund Conspiracy -- Teens and Cyber Identity Theft -- Kaitlin Jackson's Campaign Against Cyberbullying Trolls -- Hacking into Aircraft Communications and IT Wireless Communications Networks -- Level One Attacks -- Level Two Attacks -- Level Three Attacks -- Level One Threats to Be Taken Seriously -- Handle with Care! -- CryptoWall 2.0 -- The Trade in Swipeable Credit Card Information -- The Cyber Criminal Bazaar -- Cyber Thieves and Medical Records -- Nigerian Prince Come-Ons and the Latest in Targeted Online Scams -- Protecting Against Personal Cyber Attacks -- Phishing and Pharming -- Level Two Cyber-Attacks -- Trojans on the Attack Against Banks -- Insurance Collapse Due to Massive Cyber Attacks -- The "Internet of Things": A World in Which Cars, Appliances, and Almost Everything Is Connected to the Net -- Level Three Attacks -- GPS Resilience and Vulnerability -- Attack on Water and Sewage Systems via SCADA Systems -- Transit Systems and Aircraft Safety at Risk -- A Recap of Why You Should Care -- References -- 2: Where to Go for Assistance -- Help Available -- Electronic Filters That Protect Against Malware Intrusions -- Recommended Websites -- Identity Theft Protection -- Firewalls and Backup Memory -- Common Features That Personal Firewall Can Offer -- Limitations of Firewalls -- Insurance Offerings -- What to Do -- And Now How to Protect Your Family Against Cyberbullies, Pornography, Online Hate Messages, and Other Cyber-Related Maladies -- What to Do About Protecting Your Family's Computers from Cyber Criminals, Stalkers and Bullies
  • What to Do About Pornographic Sites and Sexting -- Protective Strategies for the Over-50 Crowd -- Conclusions -- References -- 3: Is Anyone Looking Out for You? Your Government? Businesses Where You Trade? Your Neighbor? or Just Yourself? -- Governmental Issues: The "Snowden Factor" -- Corporate and Industrial Issues -- Individual Transgressions and Cyber-World Concerns -- Conclusions -- References -- 4: Ten Key Things to Protect -- Introduction -- The Top Ten Things for You and Your Family to Protect Against and How -- #1. Protect Stocks, Bonds, and Retirement Accounts -- #2. Protect Your Bank Account and Credit Card Account Records -- #3. Protect Your Social Security, Medicare/Medicaid Accounts and Medical Records -- #4. Protect Desktop Computers, Wi-Fi, and Computer Routing Systems (LANS and WANS) -- #5. Protect Personal Cell Phones/Smart Phones -- #6. Upgrade Cyber Security Systems for Vital Infrastructure -- #7. Protect Big Data and Social Media: And At Least Some of Your Privacy -- #8. Don't Put All of Your Eggs in One Basket -- #9. Protect Yourself by Doing Audits -- #10. Protect Your Personal Things, Your Family, and Your Business Interests, Including Your Last Will and Testament, Plus Donations and Legacy -- Conclusions -- References -- 5: Cybersecurity for Smart Phones, Mobile Apps, and "The Cloud" -- Introduction -- The Dangers of Wi-Fi Access to the Internet -- Mobile Applications on Smart Phones -- Mobile Phone Security and Access -- Making Your Smart Phone More Secure -- Cybersecurity and Banking Apps -- The Cloud -- Evaluating Personal Cloud Services (Fig. 5.3) -- Guide to Personal Cloud Services and Their Cost and Performance -- Business Cloud Services -- Five Kinds of Cybersecurity Concerns with The Cloud -- Conclusions -- References -- 6: Protecting Vital Cyber Infrastructure -- Introduction
  • SCADA Networks in Our Lives that We Never See -- SCADA Systems Security in a Community -- Satellite Networks and Cyber Risks -- Satellites and Cybersecurity -- Satellite Technology and Systems -- Application Satellites with Cybersecurity Implications -- Fixed Satellite Systems and High Throughput Satellites -- Mobile Satellite Systems -- Conventional Mobile Satellite Communications -- Mobile Satellite Systems with ATC Ancillary Terrestrial Component -- Conclusions -- References -- 7: Who Will Control the Future, Black Hat Hackers or the Hacked? -- The Viral Cyber World -- How Do We Protect Ourselves from  Cyber-{u00AD}Attacks Going Forward? -- Coping with Current and Future Cyber Threats -- Nearer Term Threats: Computer Fraud, Wi-Fi, Wireless LANs, and the Cloud -- Wireless Local Area Networks (LANs) and Satellite Networking -- Security Flaws in The Cloud -- Best Practices for Companies in the Cloud -- Cyber Protection of Vital Infrastructure Under U.S. Government and Corporate Management -- The Smart Grid -- Vulnerable Apps on Smart Phones and Desktop Computers -- The Internet of Things -- Hololens and Cybersecurity -- Conclusions -- Post-conclusions: Cyber Opportunities vs. Cyber Threats to Our Lives? -- References -- 8: Ten Essential Rules for Your Cyber Defense -- #1. Protect Your Personal Records and Your Passwords -- #2. Obtain a Secure Place to Store Vital Information -- #3. Shred All Financial, Medical, and Other Personal Information that You Discard -- #4. Get AntiVirus Software Protection -- #5. Prevent Your Identity from Being Stolen -- #6. Obtain at Least the Basic Personal Firewall Protection -- #7. Recognize Warning Signs and Respond Quickly to Threats -- #8. Consider Getting Comprehensive Insurance Against Financial and Cyber-Loss -- #9. Support the Adoption of Stricter Governmental Legislation and Standards for Cybersecurity
  • #10. Take Common Sense Steps to Guard Against Cyber-Attacks -- References -- Appendix A Glossary of Definitions and Acronyms -- Appendix B Current U. S. Priorities on Cybersecurity -- Five Key Objectives of Cybersecurity in the United States -- Why Cyberspace Is Crucial -- Principles of U. S. Cybersecurity -- The Five-Point Protection Plan -- #1. Protect Critical Infrastructure -- #2. Improve Incident Reporting and Response -- #3. Engage Internationally -- #4. Pursue the Policy Objectives Laid Out in the U. S. International Strategy for Cyberspace -- #5. Secure Federal Networks -- Shape the Future Cyber Environment -- Appendix C The U.S. Comprehensive National Cybersecurity Initiative (CNCI) -- CNCI Initiative Details -- Initiative #1. Manage the Federal Enterprise Network as a Single Network Enterprise with Trusted Internet Connections -- Initiative #2. Deploy an Intrusion Detection System of Sensors Across the Federal Enterprise -- Initiative #3. Pursue Deployment of Intrusion Prevention Systems Across the Federal Enterprise -- Initiative #4. Coordinate and Redirect Research and Development (R&D) Efforts -- Initiative #5. Connect Current Cyber Ops Centers to Enhance Situational Awareness -- Initiative #6. Develop and Implement a Government-Wide Cyber Counterintelligence (CI) Plan -- Initiative #7. Increase the Security of Our Classified Networks -- Initiative #8. Expand Cyber Education -- Initiative #9. Define and develop enduring "leap-ahead" technology, strategies, and programs -- Initiative #10. Define and Develop Enduring Deterrence Strategies and Programs -- Initiative #11. Develop a Multi-pronged Approach for Global Supply Chain Risk Management -- Initiative #12. Define the Federal Role for Extending Cybersecurity into Critical Infrastructure Domains -- Appendix D Cybersecurity Activities and Policies Around the World
  • The European Union Agency for Network and Information Security (ENISA) -- Mission Statement -- What Does ENISA Do? -- What Does ENISA NOT Do? -- Why Was ENISA Created? -- What Does ENISA Do More Specifically? -- Who Is in Charge of ENISA? -- Why Is ENISA Situated in Crete? -- How Does ENISA Communicate? -- How Are the Industry's and Consumer's Opinions Taken into Account? -- Is It Possible to Take Part in ENISA Studies/Do Business with ENISA? -- How Many and Who Works at the Agency? -- Japanese Cybersecurity Initiatives -- Japanese Ministry of Defense Report of July 2013: Conclusions with Regard to Response to Cybersecurity Attacks -- Japanese Ministry of Defense (MoD) Cyber Defense Unit (CDU) -- OECD Guidelines: Towards a Culture of Security -- Preface -- Towards a Culture of Security -- Aims -- Principles -- Index
{'f': ''}
1 online resource (221 pages)
Form of item
Media category
Media MARC source
Media type code
unknown sound
Specific material designation

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...