logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Cybersecurity for Dummies

Cybersecurity for Dummies (Paperback, 2)

Joseph Steinberg (지은이)
For Dummies
58,380원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
43,780원 -25% 0원
880원
42,900원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Cybersecurity for Dummies
eBook 미리보기

책 정보

· 제목 : Cybersecurity for Dummies (Paperback, 2) 
· 분류 : 외국도서 > 컴퓨터 > 인터넷 > 보안
· ISBN : 9781119867180
· 쪽수 : 416쪽
· 출판일 : 2022-04-26

목차

Introduction 1

About This Book 1

Foolish Assumptions 3

Icons Used in This Book 4

Beyond the Book 4

Where to Go from Here 4

Part 1: Getting Started With Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Cybersecurity Means Different Things to Different Folks 7

Cybersecurity Is a Constantly Moving Target 9

Technological changes 9

Social shifts 14

Economic model shifts 15

Political shifts 16

Looking at the Risks Cybersecurity Mitigates 20

The goal of cybersecurity: The CIA Triad 21

From a human perspective 22

Chapter 2: Getting to Know Common Cyberattacks 23

Attacks That Inflict Damage 24

Denial-of-service (DoS) attacks 24

Distributed denial-of-service (DDoS) attacks 24

Botnets and zombies 26

Data destruction attacks 27

Is That Really You? Impersonation 27

Phishing 28

Spear phishing 28

CEO fraud 28

Smishing 29

Vishing 29

Pharming 29

Whaling: Going for the “big fish” 29

Messing around with Other People’s Stuff: Tampering 30

Captured in Transit: Interception 30

Man-in-the-middle attacks 31

Taking What Isn’t Theirs: Data Theft 32

Personal data theft 32

Business data theft 32

Data exfiltration 33

Compromised credentials 33

Forced policy violations 34

Cyberbombs That Sneak into Your Devices: Malware 34

Viruses 34

Worms 35

Trojans 35

Ransomware 35

Scareware 36

Spyware 37

Cryptocurrency miners 37

Adware 37

Blended malware 38

Zero-day malware 38

Fake malware on computers 38

Fake malware on mobile devices 38

Fake security subscription renewal notifications 39

Poisoned Web Service Attacks 39

Network Infrastructure Poisoning 40

Malvertising 40

Drive-by downloads 41

Stealing passwords 41

Exploiting Maintenance Difficulties 43

Advanced Attacks 43

Opportunistic attacks 44

Targeted attacks 44

Blended (opportunistic and targeted) attacks 45

Some Technical Attack Techniques 45

Rootkits 45

Brute-force attacks 46

Injection attacks 46

Session hijacking 47

Malformed URL attacks 47

Buffer overflow attacks 48

Chapter 3: The Bad Guys You Must Defend Against 49

Bad Guys and Good Guys Are Relative Terms 50

Bad Guys Up to No Good 51

Script kiddies 51

Kids who are not kiddies 52

Terrorists and other rogue groups 52

Nations and states 52

Corporate spies 54

Criminals 54

Hacktivists 54

Cyberattackers and Their Colored Hats 55

How Cybercriminals Monetize Their Actions 56

Direct financial fraud 56

Indirect financial fraud 57

Ransomware 59

Cryptominers 60

Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats 60

Human error 60

External disasters 62

Defending against These Attackers 67

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Don’t be Achilles: Identifying Ways You May Be Less than Secure 71

Your home computer(s) 72

Your mobile devices 73

Your Internet of Things (IoT) devices 73

Your networking equipment 74

Your work environment 74

Identifying Risks 74

Protecting against Risks 75

Perimeter defense 76

Firewall/router 76

Security software 79

Your physical computer(s) and any other endpoints 79

Backups 79

Detecting 80

Responding 80

Recovering 80

Improving 80

Evaluating Your Current Security Measures 80

Software 81

Hardware 82

Insurance 83

Education 83

Privacy 101 84

Think before you share 84

Think before you post 85

General privacy tips 86

Banking Online Safely 88

Safely Using Smart Devices 90

Cryptocurrency Security 101 91

Chapter 5: Enhancing Physical Security 93

Understanding Why Physical Security Matters 94

Taking Inventory 94

Stationary devices 96

Mobile devices 97

Locating Your Vulnerable Data 97

Creating and Executing a Physical Security Plan 98

Implementing Physical Security 100

Security for Mobile Devices 101

Realizing That Insiders Pose the Greatest Risks 102

Chapter 6: Cybersecurity Considerations When Working from Home 105

Network Security Concerns 106

Device Security Concerns 108

Location Cybersecurity 109

Shoulder surfing 109

Eavesdropping 110

Theft 110

Human errors 110

Video Conferencing Cybersecurity 111

Keep private stuff out of camera view 111

Keep video conferences secure from unauthorized visitors 111

Social Engineering Issues 113

Regulatory Issues 113

Part 3: Protecting Yourself From Yourself 115

Chapter 7: Securing Your Accounts 117

Realizing You’re a Target 117

Securing Your External Accounts 118

Securing Data Associated with User Accounts 119

Conduct business with reputable parties 119

Use official apps and websites 120

Don’t install software from untrusted parties 120

Don’t root your phone 120

Don’t provide unnecessary sensitive information 120

Use payment services that eliminate the need to share credit card numbers 120

Use one-time, virtual credit card numbers when appropriate 121

Monitor your accounts 122

Report suspicious activity ASAP 122

Employ a proper password strategy 122

Utilize multifactor authentication 122

Log out when you’re finished 124

Use your own computer or phone 124

Lock your computer 124

Use a separate, dedicated computer for sensitive tasks 125

Use a separate, dedicated browser for sensitive web-based tasks 125

Secure your access devices 125

Keep your devices up to date 125

Don’t perform sensitive tasks over public Wi-Fi 125

Never use public Wi-Fi in high-risk places 126

Access your accounts only in safe locations 126

Use appropriate devices 126

Set appropriate limits 126

Use alerts 127

Periodically check access device lists 127

Check last login info 127

Respond appropriately to any fraud alerts 127

Never send sensitive information over an unencrypted connection 127

Beware of social engineering attacks 128

Establish voice login passwords 129

Protect your cellphone number 129

Don’t click on links in emails or text messages 129

Securing Data with Parties You’ve Interacted With 130

Securing Data at Parties You Haven’t Interacted With 132

Securing Data by Not Connecting Hardware with Unknown Pedigrees 133

Chapter 8: Passwords 135

Passwords: The Primary Form of Authentication 135

Avoiding Simplistic Passwords 136

Password Considerations 137

Easily guessable personal passwords 137

Complicated passwords aren’t always better 138

Different levels of sensitivity 138

Your most sensitive passwords may not be the ones you think 139

You can reuse passwords — sometimes 139

Consider using a password manager 140

Creating Memorable, Strong Passwords 142

Knowing When to Change Passwords 143

Changing Passwords after a Breach 144

Providing Passwords to Humans 144

Storing Passwords 145

Storing passwords for your heirs 145

Storing general passwords 145

Transmitting Passwords 146

Discovering Alternatives to Passwords 146

Biometric authentication 146

SMS-based authentication 148

App-based one-time passwords 149

Hardware token authentication 149

USB-based authentication 150

Chapter 9: Preventing Social Engineering Attacks 151

Don’t Trust Technology More than You Would People 151

Types of Social Engineering Attacks 152

Six Principles Social Engineers Exploit 156

Don’t Overshare on Social Media 156

Your schedule and travel plans 157

Financial information 158

Personal information 158

Work information 160

Possible cybersecurity issues 160

Crimes and minor infractions 160

Medical or legal advice 160

Your location 161

Your birthday 161

Your “sins” 161

Leaking Data by Sharing Information as Part of Viral Trends 162

Identifying Fake Social Media Connections 162

Photo 163

Verification 163

Friends or connections in common 163

Relevant posts 164

Number of connections 164

Industry and location 165

Similar people 165

Duplicate contact 165

Contact details 165

Premium status 166

LinkedIn endorsements 166

Group activity 166

Appropriate levels of relative usage 167

Human activities 167

Cliché names 167

Poor contact information 168

Skill sets 168

Spelling 168

Age of an account 168

Suspicious career or life path 168

Level or celebrity status 169

Using Bogus Information 170

Using Security Software 170

General Cyberhygiene Can Help Prevent Social Engineering 171

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Making Sure Someone Is In Charge 175

Watching Out for Employees 176

Incentivize employees 177

Avoid giving out the keys to the castle 177

Give everyone separate credentials 178

Restrict administrators 178

Limit access to corporate accounts 178

Implement employee policies 180

Enforce social media policies 183

Monitor employees 183

Dealing with a Remote Workforce 184

Use work devices and separate work networks 185

Set up virtual private networks 185

Create standardized communication protocols 186

Use a known network 186

Determine how backups are handled 187

Be careful where you work remotely 187

Be extra vigilant regarding social engineering 188

Considering Cybersecurity Insurance 189

Complying with Regulations and Compliance 190

Protecting employee data 190

PCI DSS 191

Breach disclosure laws 191

GDPR 192

HIPAA 192

Biometric data 193

Anti-money laundering laws 193

International sanctions 193

Handling Internet Access 193

Segregate Internet access for personal devices 193

Create bring your own device (BYOD) policies 194

Properly handle inbound access 194

Protect against denial-of-service attacks 196

Use https 197

Use a VPN 197

Run penetration tests 197

Be careful with IoT devices 197

Use multiple network segments 198

Be careful with payment cards 198

Managing Power Issues 198

Chapter 11: Cybersecurity and Big Businesses 201

Utilizing Technological Complexity 202

Managing Custom Systems 202

Continuity Planning and Disaster Recovery 203

Looking at Regulations 203

Sarbanes Oxley 203

Stricter PCI requirements 205

Public company data disclosure rules 205

Breach disclosures 205

Industry-specific regulators and rules 206

Fiduciary responsibilities 206

Deep pockets 207

Deeper Pockets — and Insured 207

Considering Employees, Consultants, and Partners 208

Dealing with internal politics 209

Offering information security training 209

Replicated environments 209

Looking at the Chief Information Security Officer’s Role 210

Overall security program management 210

Test and measurement of the security program 210

Human risk management 211

Information asset classification and control 211

Security operations 211

Information security strategy 211

Identity and access management 211

Data loss prevention 212

Fraud prevention 212

Incident response plan 213

Disaster recovery and business continuity planning 213

Compliance 213

Investigations 213

Physical security 214

Security architecture 214

Geopolitical risks 214

Ensuring auditability of system administrators 215

Cybersecurity insurance compliance 215

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Identifying Overt Breaches 220

Ransomware 220

Defacement 221

Claimed destruction 221

Detecting Covert Breaches 222

Your device seems slower than before 223

Your Task Manager doesn’t run 223

Your Registry Editor doesn’t run 223

Your device starts suffering from latency issues 224

Your device starts suffering from communication and buffering issues 225

Your device’s settings have changed 226

Your device is sending or receiving strange email messages 226

Your device is sending or receiving strange text messages 226

New software (including apps) is installed on your device — and you didn’t install it 226

Your device’s battery seems to drain more quickly than before 227

Your device seems to run hotter than before 227

File contents have been changed 228

Files are missing 228

Websites appear different than before 228

Your Internet settings show a proxy, and you never set one up 228

Some programs (or apps) stop working properly 229

Security programs have turned off 229

An increased use of data or text messaging (SMS) 230

Increased network traffic 230

Unusual open ports 230

Your device starts crashing 231

Your cellphone bill shows unexpected charges up to here 232

Unknown programs request access 232

External devices power on unexpectedly 232

Your device acts as if someone else were using it 232

New browser search engine default 232

Your device password has changed 233

Pop-ups start appearing 233

New browser add-ons appear 233

New browser home page 234

Your email from the device is getting blocked by spam filters 234

Your device is attempting to access “bad” sites 234

You’re experiencing unusual service disruptions 234

Your device’s language settings changed 235

You see unexplained activity on the device 235

You see unexplained online activity 235

Your device suddenly restarts 235

You see signs of data breaches and/or leaks 236

You are routed to the wrong website 236

Your hard drive or SSD light never seems to turn off 236

Other abnormal things happen 237

Chapter 13: Recovering from a Security Breach 239

An Ounce of Prevention Is Worth Many Tons of Response 239

Stay Calm and Act Now with Wisdom 240

Bring in a Pro 240

Recovering from a Breach without a Pro’s Help 241

Step 1: Figure out what happened or is happening 241

Step 2: Contain the attack 242

Step 3: Terminate and eliminate the attack 243

Reinstall Damaged Software 247

Restart the system and run an updated security scan 247

Erase all potentially problematic System Restore points 248

Restore modified settings 248

Rebuild the system 249

Dealing with Stolen Information 250

Paying ransoms 251

Learning for the future 253

Recovering When Your Data Is Compromised at a Third Party 253

Reason the notice was sent 254

Scams 254

Passwords 255

Payment card information 256

Government-issued documents 256

School or employer-issued documents 257

Social media accounts 257

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Backing Up Is a Must 261

Backing Up Data from Apps and Online Accounts 262

SMS texts 263

Social media 263

WhatsApp 264

Google Photos 264

Other apps 264

Backing Up Data on Smartphones 265

Android 265

Apple 265

Conducting Cryptocurrency Backups 267

Backing Up Passwords 267

Looking at the Different Types of Backups 267

Full backups of systems 267

Original system images 269

Later system images 269

Original installation media 269

Downloaded software 270

Full backups of data 270

Incremental backups 271

Differential backups 271

Mixed backups 272

Continuous backups 272

Partial backups 273

Folder backups 273

Drive backups 274

Virtual drive backups 274

Exclusions 275

In-app backups 276

Figuring Out How Often You Should Backup 277

Exploring Backup Tools 278

Backup software 278

Drive-specific backup software 279

Windows Backup 279

Smartphone/tablet backup 280

Manual file or folder copying backups 280

Automated task file or folder copying backups 280

Creating a Boot Disk 281

Knowing Where to Back Up 281

Local storage 282

Offsite storage 282

Cloud 282

Network storage 283

Mixing locations 284

Knowing Where Not to Store Backups 284

Encrypting Backups 285

Testing Backups 286

Disposing of Backups 286

Chapter 15: Resetting Your Device 289

Exploring Two Types of Resets 289

Soft resets 290

Hard resets 292

Rebuilding Your Device after a Hard Reset 298

Chapter 16: Restoring from Backups 299

You Will Need to Restore 299

Wait! Do Not Restore Yet! 300

Restoring Data to Apps 300

Restoring from Full Backups of Systems 301

Restoring to the computing device that was originally backed up 301

Restoring to a different device than the one that was originally backed up 302

Original system images 303

Later system images 303

Installing security software 303

Original installation media 304

Downloaded software 304

Restoring from full backups of data 305

Restoring from Incremental Backups 306

Incremental backups of data 306

Incremental backups of systems 306

Differential backups 307

Continuous backups 308

Partial backups 308

Folder backups 309

Drive backups 309

Virtual-drive backups 310

Dealing with Deletions 311

Excluding Files and Folders 311

Understanding Archives 312

Multiple files stored within one file 312

Old live data 313

Old versions of files, folders, or backups 314

Restoring Using Backup Tools 314

Restoring from a Windows backup 315

Restoring to a system restore point 315

Restoring from a smartphone/tablet backup 315

Restoring from manual file or folder copying backups 316

Utilizing third-party backups of data hosted at third parties 317

Returning Backups to Their Proper Locations 317

Network storage 317

Restoring from a combination of locations 318

Restoring to Non-Original Locations 318

Never Leave Your Backups Connected 318

Restoring from Encrypted Backups 319

Testing Backups 319

Restoring Cryptocurrency 319

Booting from a Boot Disk 320

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Professional Roles in Cybersecurity 324

Security engineer 324

Security manager 324

Security director 324

Chief information security officer (CISO) 324

Security analyst 325

Security architect 325

Security administrator 325

Security auditor 325

Cryptographer 325

Vulnerability assessment analyst 326

Ethical hacker 326

Security researcher 326

Offensive hacker 326

Software security engineer 327

Software source code security auditor 327

Security consultant 327

Security expert witness 327

Security specialist 327

Incident response team member 328

Forensic analyst 328

Cybersecurity regulations expert 328

Privacy regulations expert 328

Exploring Career Paths 328

Career path: Senior security architect 329

Career path: CISO 329

Starting Out in Information Security 331

Exploring Popular Certifications 332

CISSP 332

CISM 333

CEH 333

Security+ 334

GSEC 334

Verifiability 335

Ethics 335

Overcoming a Criminal Record 335

Overcoming Bad Credit 336

Looking at Other Professions with a Cybersecurity Focus 336

Chapter 18: Emerging Technologies Bring New Threats 337

Relying on the Internet of Things 338

Critical infrastructure risks 339

Computers on wheels: modern cars 340

Using Cryptocurrencies and Blockchain 340

Cloud-Based Applications and Data 342

Optimizing Artificial Intelligence 343

Increased need for cybersecurity 344

Use as a cybersecurity tool 345

Use as a hacking tool 345

Where Was This Laptop Really Made? Supply Chain Risks 346

Nothing Is Trustworthy: Zero Trust 347

Genius Computers Are Coming: Quantum Supremacy 347

Experiencing Virtual Reality 348

Transforming Experiences with Augmented Reality 350

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Understand That You Are a Target 353

Use Security Software 354

Encrypt Sensitive Information 354

Back Up Often 356

Do Not Share Login Credentials 356

Use Proper Authentication 357

Use Social Media Wisely 357

Segregate Internet Access 357

Use Public Wi-Fi Safely (Or Better Yet, Don’t Use It!) 358

Hire a Pro 358

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Marriott 359

Target 361

Sony Pictures 362

U.S Office of Personnel Management 363

Anthem 363

Colonial Pipeline and JBS SA 364

Colonial Pipeline 364

JBS 365

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Use Your Cellphone as a Mobile Hotspot 368

Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi 368

Don’t Perform Sensitive Tasks over Public Wi-Fi 369

Don’t Reset Passwords When Using Public Wi-Fi 369

Use a VPN Service 369

Use Tor 369

Use Encryption 370

Turn Off Sharing 370

Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks 370

Understand the Difference between True Public Wi-Fi and Shared Wi-Fi 370

Index 371

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책