Reviews"An excellent resource . . . The chapters scaffold in a beautiful fashion leaving the reader with a concrete foundation of cyber knowledge. Sam's ability to explain abstract or complex concepts in a simplistic, digestible, and visual way is a major strength of this book. Novices or anyone interested in learning about cybersecurity, this is the book for you!" --Dr. Pauline Mosley, Pace University, Professor of Information Technology
Dewey Edition23
Table Of ContentChapter 1: An Introduction to Cybersecurity Chapter 2: Attack Targets on the Internet Chapter 3: Phishing Tactics Chapter 4: Malware Infections Chapter 5: Password Thefts and Other Account Access Tricks Chapter 6: Network Tapping Chapter 7: Attacks in the Cloud Chapter 8: Wireless Network Pirating Chapter 9: Encryption Cracking Chapter 10: How to Defeat Black Hats
SynopsisCybersecurity for Beginners is an engaging, informal introduction to the field of cybersecurity. Readers learn how attackers operate, as well as how to defend individuals and organisations against online attacks. An accessible introduction to the field of cybersecurity, requiring no prior technical knowledge. Readers learn how 'black hat' (criminal) hackers select targets, trick victims into divulging private information, deploy malware, steal passwords, steal data, pirate WiFi, and escape detection. Readers also learn strategies for defending against online attacks., How Cybersecurity Really Works is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks. How Cybersecurity Really Works is the perfect introduction to cybersecurity. Whether you're a computer science student or a business professional, it will teach you the basics without all the jargon. This beginners guide covers different types of attacks, common tactics used by online adversaries, and defensive strategies you can use to protect yourself. You'll learn what security professionals do, what an attack looks like from a cybercriminal's viewpoint, and how to implement sophisticated cybersecurity measures on your own devices. In addition, you'll find explanations of topics like malware, phishing, and social engineering attacks, coupled with real-world examples and hands-on exercises to help you apply what you've learned. You'll explore ways to bypass access controls, prevent infections from worms and viruses, and protect your cloud accounts from attackers. You'll also learn how to: - Analyze emails to detect phishing attempts - Use SQL injection to attack a website - Examine malware from the safety of a sandbox environment - Use the command line to evaluate and improve your computer and network security - Deploy encryption and hashing to protect your files - Create a comprehensive risk management plan You can't afford to ignore cybersecurity anymore, but attackers won't wait while you read a long technical manual. That's why How Cybersecurity Really Works teaches you just the essentials you need to think beyond antivirus and make the right decisions to keep the online monsters at bay.