03437nam 2200529 450 991081670500332120200520144314.01-5015-0636-61-5015-0650-110.1515/9781501506505(CKB)4100000007389735(DE-B1597)479830(OCoLC)1083582177(DE-B1597)9781501506505(Au-PeEL)EBL5157542(CaSebORM)9781501506369(MiAaPQ)EBC5157542(EXLCZ)99410000000738973520181019h20192019 uy| 0engurcnu||||||||rdacontentrdamediardacarrierUnderstanding security issues /Scott E. Donaldson, Chris K. Williams, and Stanley G. SiegelBoston :Walter de Gruyter Incorporated,[2019]©20191 online resource (208 pages) illustrationsIncludes index.1-5015-1523-3 Frontmatter --About DeG PRESS --Acknowledgments --About the Authors --Contents --Introduction --Chapter 1. Security Mindset --Chapter 2. Common Cybersecurity Attacks --Chapter 3. Protecting Your Computer(s) --Chapter 4. Protecting Your Passwords --Chapter 5. Protecting Your Home Network --Chapter 6. Smartphones and Tablets --Chapter 7. Protecting Your Web Browsing --Chapter 8. Protecting Your E-Mail and Phone Calls --Chapter 9. Protecting Your Identity, Privacy, and Family Online --Chapter 10. Protecting Yourself on Travel --Chapter 11. When Things Go Wrong --Chapter 12. Considering Cybersecurity at Work --Chapter 13. Final Thoughts --Appendix A. Common Online Scams --Appendix B. The Worst Passwords Ever --Appendix C. Online Security Resources --Glossary --IndexWith the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.  This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.Computer securityComputer networksSecurity measuresComputer security.Computer networksSecurity measures.005.8Donaldson Scott E.959977Williams Chris K.Siegel Stanley G.MiAaPQMiAaPQMiAaPQBOOK9910816705003321Understanding security issues3969718UNINA