Skip to content

Security Awareness Applying Practical Security in Your World

Best in textbook rentals since 2012!

ISBN-10: 1111644187

ISBN-13: 9781111644185

Edition: 4th 2014

Authors: Mark Ciampa

List price: $98.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fourth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions…    
Customers also bought

Book details

List price: $98.95
Edition: 4th
Copyright year: 2014
Publisher: Course Technology
Publication date: 1/1/2013
Binding: Paperback
Pages: 256
Size: 7.50" wide x 9.00" long x 0.50" tall
Weight: 0.924
Language: English

Mark Ciampa is an Assistant Professor of Computer Information Systems at Western Kentucky University in Bowling Green, Kentucky and is a PhD student at Indiana State University in Digital Communications. Prior to this he was an Associate Professor and the Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee. Mark has worked in the IT industry as a computer consultant for the U.S. Postal Service, the Tennessee Municipal Technical Advisory Service, and the University of Tennessee, and has taught in higher education for over 25 years. He is the author of several Course Technology books, including Security Awareness: Applying Practical Security In Your…    

Introduction
Introduction to Security
Challenges of Securing Information
Today's Attacks
Difficulties in Defending against Attacks
What Is Information Security?
Understanding Security
Defining Information Security
Information Security Terminology
Understanding the Importance of Information Security
Who Are the Attackers?
Cybercriminals
Script Kiddies
Spies
Insiders
Cyberterrorists
Hactivists
Government Agencies
Building a Comprehensive Security Strategy
Block Attacks
Update Defenses
Minimize Losses
Send Secure Information
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Personal Security
Passwords
Password Weaknesses
Attacks on Passwords
Social Engineering Attacks
Psychological Approaches
Physical Procedures
Identity Theft
Social Networking Risks
Personal Security Defenses
Password Defenses
Recognizing Phishing Attacks
Avoiding Identity Theft
Setting Social Networking Defenses
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Computer Security
Attacks Using Malware
Malware That Spreads
Malware That Conceals
Malware That Profits
Computer Defenses
Managing Patches
Installing Antivirus Software
Configuring Personal Firewalls
Using User Account control (UAC)
Creating Data Backups
Recovering from an Attack
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Internet Security
How the Internet Works
The World Wide Web
E-Mail
Internet Security Risks
Mobile Code
Cookies
Fraudulent Digital Certificates
Drive-By Downloads
Redirected Web Traffic
E-Mail Risks
Internet Defenses
Configuring Web Browser Settings
E-Mail Defenses
Internet Security Best Practices
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Mobile Security
Mobile Attacks
Attacks through Wireless Networks
Attacks on Mobile Devices
Mobile Defenses
Wireless Network Security
Mobile Device Security
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Workplace Security
Restricting Physical Access
Access to Facilities
Access to Systems
Restricting Data Access
Security Policies
Access Control
Crisis Preparedness
Protecting against Fires
Computer Forensics
Disaster Recovery
Chapter Summary
Key Terms
Review Questions
Hands-On Projects
Case Projects
References
Glossary
Index