Cybersecurity Cybersecurity
    • €11.99

Publisher Description

An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.
Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.

GENRE
Computing & Internet
RELEASED
2021
14 September
LANGUAGE
EN
English
LENGTH
160
Pages
PUBLISHER
MIT Press
PROVIDER INFO
Random House, LLC
SIZE
776.2
KB
How Cybersecurity Really Works How Cybersecurity Really Works
2021
Computer Security Basics Computer Security Basics
2006
The InfoSec Handbook The InfoSec Handbook
2014
Foundations of Information Security Foundations of Information Security
2019
Network Security Bible Network Security Bible
2011
Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security
2020
Understanding Beliefs Understanding Beliefs
2014
Recommendation Engines Recommendation Engines
2020
Machine Learning, revised and updated edition Machine Learning, revised and updated edition
2021
Computational Thinking Computational Thinking
2019
Data Science Data Science
2018
AI Ethics AI Ethics
2020
Macroeconomics Macroeconomics
2020
AI Ethics AI Ethics
2020
The Technological Singularity The Technological Singularity
2015
Artificial General Intelligence Artificial General Intelligence
2024
Causal Inference Causal Inference
2023
Placebos Placebos
2022