Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Cyber Defense

70,99 €

Sofort verfügbar, Lieferzeit: Sofort lieferbar

Format auswählen

Cyber Defense, Wiley
Best Practices for Digital Safety
Von Jason Edwards, im heise shop in digitaler Fassung erhältlich

Produktinformationen "Cyber Defense"

PRACTICAL AND THEORETICAL GUIDE TO UNDERSTANDING CYBER HYGIENE, EQUIPPING READERS WITH THE TOOLS TO IMPLEMENT AND MAINTAIN DIGITAL SECURITY PRACTICESCyber Defense is a comprehensive guide that provides an in-depth exploration of essential practices to secure one’s digital life. The book begins with an introduction to cyber hygiene, emphasizing its importance and the foundational concepts necessary for maintaining digital security. It then dives into financial security, detailing methods for protecting financial accounts, monitoring transactions, and compartmentalizing accounts to minimize risks. Password management and multifactor authentication are covered, offering strategies for creating strong passwords, using password managers, and enabling multifactor authentication. With a discussion on secure internet browsing practices, techniques to avoid phishing attacks, and safe web browsing, this book provides email security guidelines for recognizing scams and securing email accounts. Protecting personal devices is discussed, focusing on smartphones, tablets, laptops, IoT devices, and app store security issues. Home network security is explored, with advice on securing home networks, firewalls, and Wi-Fi settings. Each chapter includes recommendations for success, offering practical steps to mitigate risks. Topics covered in Cyber Defense include:

* Data protection and privacy, providing insights into encrypting information and managing personal data
* Backup and recovery strategies, including using personal cloud storage services
* Social media safety, highlighting best practices, and the challenges of AI voice and video
* Actionable recommendations on protecting your finances from criminals
* Endpoint protection, ransomware, and malware protection strategies, alongside legal and ethical considerations, including when and how to report cyber incidents to law enforcement

Cyber Defense is an essential guide for anyone, including business owners and managers of small and medium-sized enterprises, IT staff and support teams, and students studying cybersecurity, information technology, or related fields. JASON EDWARDS, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and a popular voice on LinkedIn. Contents

Chapter 1: Why Cyber Safety Matters Today9

The Rise of Digital Connectivity10

The Expanding Threat Landscape12

Personal Implications of Cyber Insecurity15

The Importance of Proactive Cyber Safety18

Adopting Safe Online Proactices20

Recommendations23

Chapter Conclusion25

Chapter Questions26

Chapter 2: Understanding Cyber Safety in the Digital Age29

Defining Cyber Safety and Security30

Fundamentals of Digital Literacy33

Developing Critical Thinking Skills Online35

The Human Element in Cybersecurity38

Recommendations42

Chapter Conclusion43

Chapter Questions44

Chapter 3: Understanding and Preventing Identity Theft47

What is Identity Theft?48

Recognizing Signs of Identity Theft51

Understanding Data Breaches55

Preventing Identity Theft58

Responding to Identity Theft and Data Breaches62

Recommendations66

Chapter Conclusion68

Chapter Questions69

Chapter 4: Protecting Your Accounts with Strong Passwords and MFA72

The Importance of Strong Passwords72

Creating and Managing Strong Passwords76

Understanding Multi-Factor Authentication (MFA)78

Advanced Account Security Measures80

Protecting Business and Shared Accounts83

Recommendations86

Chapter Conclusion87

Chapter Questions88

Chapter 5: Email Security Best Practices91

Understanding Email Threats92

Recognizing and Avoiding Phishing Attempts95

Securing Your Email Accounts99

Safe Email Practices102

Professional Email Etiquette and Security105

Recommendations108

Chapter Conclusion110

Chapter Questions110

Chapter 6: Managing Your Digital Footprint and Online Reputation114

Understanding Your Digital Footprint115

Monitoring and Controlling Your Online Presence118

Building a Positive Online Reputation120

Privacy Considerations123

Future Implications of Your Digital Footprint125

Recommendations127

Chapter Conclusion129

Chapter Questions130

Chapter 7: Safe and Professional Use of Social Media133

Navigating Social Media Platforms Securely133

Protecting Personal Information136

Professional Conduct on Social Media139

Dealing with Social Media Threats141

Leveraging Social Media Safely143

Recommendations145

Chapter Conclusion147

Chapter Questions148

Chapter 8: Dealing with Cyberbullying and Online Harassment152

Understanding Cyberbullying and Harassment153

Recognizing Signs of Cyberbullying155

Strategies for Victims158

Preventing Cyberbullying160

Supporting Others and Advocacy163

Recommendations166

Chapter Conclusion167

Chapter Questions168

Chapter 9: Children's Online Safety and Parental Controls171

The Digital World of Children and Teens172

Communicating with Children About Cyber Safety175

Implementing Parental Controls and Monitoring177

Educating Children on Safe Online Practices180

Collaborating with Schools and Communities183

Recommendations185

Chapter Conclusion187

Chapter Questions188

Chapter 10: Avoiding Online Scams and Social Engineering Tricks192

Understanding Social Engineering193

Common Online Scams195

Recognizing Red Flags199

Protecting Yourself from Scams202

Educating Others and Staying Informed206

Recommendations208

Chapter Conclusion210

Chapter Questions210

Chapter 11: Using AI Securely and Protecting Your Privacy214

The Role of AI in Everyday Life215

Privacy Concerns with AI Technologies218

Secure Use of AI-Powered Devices and Services221

Protecting Personal Data in the Age of AI224

Preparing for Future AI Developments228

Recommendations230

Chapter Conclusion232

Chapter Questions233

Chapter 12: Securing Your Devices and Wearables236

Mobile Device Security Essentials237

Protecting Against Mobile Malware240

Securing Wearable Devices242

Physical Security and Theft Prevention245

Disposal and Recycling of Devices248

Recommendations251

Chapter Conclusion253

Chapter Questions254

Chapter 13: Managing Software and App Security on All Devices257

Importance of Software Security258

Safe Installation and Use of Applications261

Configuration and Hardening of Software263

Application Whitelisting and Blacklisting266

Responding to Software Vulnerabilities270

Recommendations272

Chapter Conclusion274

Chapter Questions275

Chapter 14: Defending Yourself Against Ransomware and Malware278

Understanding Malware and Ransomware279

Preventing Malware Infections283

Recognizing Signs of Infection286

Responding to a Malware Attack290

Mitigating the Impact of Ransomware292

Recommendations295

Chapter Conclusion296

Chapter Questions297

Chapter 15: How to Stay Safe While Browsing the Internet301

Secure Browsing Practices302

Avoiding Malicious Websites and Content305

Protecting Personal Information Online308

Mental Health and Digital Well-being312

Safe Participation in Online Communities314

Recommendations317

Chapter Conclusion318

Chapter Questions319

Chapter 16: Network Security322

Securing Your Home Network323

Protecting Internet of Things (IoT) Devices326

Safe Use of Public Wi-Fi Networks328

Encryption and VPNs330

Cybersecurity for Remote Work and Home Offices333

Securing Online Gaming and Virtual Reality Platforms336

Recommendations339

Chapter Conclusion340

Chapter Questions341

Chapter 17: Safeguarding Your Financial Assets and Secure Online Transactions345

Secure Online Banking Practices346

Safe Online Shopping349

Protecting Against Financial Fraud352

Understanding Cryptocurrency Security356

Planning for Financial Security359

Recommendations361

Chapter Conclusion362

Chapter Questions363

Chapter 18: Protecting Your Data: Backups, Cloud Storage, and Disaster Recovery367

Importance of Data Protection368

Effective Backup Strategies371

Secure Use of Cloud Storage373

Disaster Recovery Planning376

Data Disposal and Destruction379

Recommendations381

Chapter Conclusion382

Chapter Questions384

Chapter 19: Cyber Crimes and How to Report Them387

Understanding Cyber Crimes388

Recognizing When You're a Victim391

Reporting Cyber Crimes394

The Investigation and Legal Process398

Preventing Future Incidents400

Recommendations402

Chapter Conclusion404

Chapter Questions405

Chapter 20: Preparing for Emerging Cyber Threats408

Emerging Cyber Threats409

AI and Machine Learning in Cybersecurity411

Adapting Security Practices415

Personal Strategies for Future-Proofing Security418

The Role of Individuals in Shaping Cybersecurity421

Recommendations424

Chapter Conclusion425

Chapter Questions426

Chapter 21: Teaching and Empowering Others in Cyber Safety429

Sharing Knowledge and Resources430

Encouraging Safe Practices in the Workplace433

Supporting Friends and Family436

Mentoring and Community Involvement439

Continuing the Journey of Cyber Safety441

Recommendations443

Chapter Conclusion445

Chapter Questions446

Appendix – Answers to Chapter Questions449

Chapter 1449

Chapter 2452

Chapter 3454

Chapter 4456

Chapter 5459

Chapter 6462

Chapter 7465

Chapter 8468

Chapter 9470

Chapter 10472

Chapter 11474

Chapter 12476

Chapter 13478

Chapter 14480

Chapter 15482

Chapter 16484

Chapter 17486

Chapter 18488

Chapter 19490

Chapter 20492

Chapter 21494

Glossary496

Artikel-Details

Anbieter:
Wiley
Autor:
Jason Edwards
Artikelnummer:
9781394337033
Veröffentlicht:
13.03.25
Seitenanzahl:
400