top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Autore Bandler John
Pubbl/distr/stampa Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Descrizione fisica 1 online resource (xxiv, 392 pages) : illustrations
Disciplina 005.8024/34
Soggetto topico Computer security - Law and legislation - United States
Computer networks - Security measures - United States
Law offices - United States
Data protection - Law and legislation - United States
ISBN 1-63425-908-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgments -- Foreword -- CHAPTER 1 The Need for Cybersecurity -- Why This Book? -- What You Should Do Right Now -- How This Book Is Organized -- You Can Improve Your Own Cybersecurity -- CHAPTER 2 The Black Market for Your Data: The Cybercrime Economy -- A. Introduction -- B. It Is a Big Business -- C. It Is International -- D. Digital Currency -- E. Payment Card Fraud: An Example of the Cybercrime Economy -- F. Other Cybercrime and Identity Theft Schemes -- 1. Financial Account Takeover -- 2. New Financial Account Opening -- 3. Infected Computers -- 4. Phishing, Spam, and Internet Account Takeover -- 5. Other Ways to Obtain Passwords -- 6. E-mail Account Compromise (Hack) -- 7. Ransomware -- 8. Scareware and Technical Support Scams -- G. Government and Law Enforcement Response -- CHAPTER 3 Advertising: Another Market for Your Data -- A. Introduction -- B. Corporate Collection and Use of Your Information and Data -- C. What (or Who) Is the Product? -- D. Privacy Policies and the Consumer -- E. Corporate Data Storage -- F. Conclusion -- CHAPTER 4 Basic Information Security Principles -- A. Introduction -- B. Physical Security -- 1. Theft and Damage -- 2. Controlling Access to Your Devices at Home -- C. Confidentiality -- 1. Authentication -- 2. Encryption -- D. Availability -- 1. "If It Ain't Broke, Don't Fix It." But Maybe It Is Broken After All? -- 2. Availability, Authentication, and Confidentiality -- 3. Availability and Ransomware and Other Malicious Destruction -- 4. Availability and Backup -- 5. Business Continuity and Disaster Recovery Planning -- E. Integrity -- F. The Principle of "Least Privilege" and "Need to Know" -- 1. Data Access -- 2. Administrator Rights and Accounts -- G. Information Classification -- H. Conclusion.
CHAPTER 5 Basic Computer Principles -- A. Introduction -- B. The Evolution of Computing -- 1. Storing Information -- 2. Processing Information -- C. Computer Hardware -- 1. Case -- 2. Power Supply -- 3. Display -- 4. Ports: USB, Parallel, Serial, VGA, DVI, HDMI, DP -- 5. Input Devices (Keyboard, Mouse, Microphone, Camera, and More) -- 6. Network Interface Controller -- 7. Processor (Central Processing Unit, Microprocessor) -- 8. Random Access Memory -- 9. Motherboard (System Board) -- 10. Internal Data Storage -- 11. External Data Storage -- 12. External Devices Such as Scanners and Printers -- D. Programs That Run on Your Computer: BIOS, Operating System, Applications -- 1. BIOS -- 2. Operating System -- 3. File System -- 4. Applications (Software) -- 5. Virtual Ports -- E. From Desktop to Miniature: Laptop, Notebook, Tablet, Smartphone, Smartwatch, IoT -- F. Computers on Steroids: The Cloud and Data Centers -- G. Encryption of Data at Rest -- H. Conclusion -- CHAPTER 6 Basic Networking and the Internet -- A. Introduction -- B. Network Interface Controller -- C. Internet -- 1. Dial-up -- 2. Cable Internet (Broadband) -- 3. Phone Company Internet (DSL, FiOS) -- 4. Cellular Company Internet -- 5. Satellite Internet -- D. Modem -- E. Router -- F. Internet Communication 101 -- 1. IP Addresses on the Internet -- 2. IP Addresses on Your Local Network: Network Address Translation -- 3. Ports: Virtual Router Ports and Computer Ports -- 4. TCP/UDP Internet Protocols (Language) -- 5. Network Layers -- G. Wired Networking -- H. Wireless Networking -- I. Encryption in Transit -- J. Conclusion -- CHAPTER 7 Start Securing Yourself -- A. Introduction -- B. Set Your Cybersecurity Dial -- C. Turning Up Your Security Dial Is an Investment -- D. There Is No Perfect Product or Solution -- E. Let's Get Started (If You Haven't Already).
1. Put a Password on All of Your Computing Devices -- 2. Enable the "Auto Lock" Feature -- 3. Run an Anti-Malware Scan on Your Laptop and Desktop -- 4. Disconnect from the Internet When You Don't Need It -- 5. Use Complex and Unique Passwords -- 6. Enable "Two-Step" Login -- 7. Ensure That Your Home Wi-Fi Network Is Password Protected -- F. Conclusion -- CHAPTER 8 Secure Your Devices -- A. Introduction -- B. Mentally Assess Your Devices -- C. Getting Started -- D. Device Inventory (Scavenger Hunt) -- 1. Device Description -- 2. Ownership and Expectation of Privacy -- E. Access: Physical Control -- F. Access: Electronic (Technical) -- 1. Device Password Complexity -- 2. Auto Lock Feature and Affirmatively Locking Your Device -- G. User Accounts: Usage by Whom and for What Purposes? -- 1. Administrator Accounts vs. User Accounts -- 2. Segregation of User Accounts -- H. Operating System -- I. Applications (Software) -- J. Data Stored on Device -- K. Data the Device Can Access (Cloud Data) -- L. Anti-Malware -- M. Internet Access -- N. Firewall -- O. Decommissioning Your Device -- 1. Basic Decommissioning Steps -- P. Conclusion -- CHAPTER 9 Secure Your Data -- A. Introduction -- B. Mentally Assess Your Data and What It Means to You -- 1. Assess Your Own Skills and Memory -- 2. Assess by Data Type -- 3. Assess by Data Importance and Risk -- 4. Assess by Data Storage Location and Provider -- 5. Assessment Wrap-Up -- C. Getting Started -- D. Secure Your Devices (Encore) -- E. Back Up Your Data -- 1. Manually Back Up Data to an External Hard Drive -- 2. Make Incremental Backups of Your Most Important Documents -- 3. Manually Back Up Data from Your Cloud Accounts to a Local Device or External Hard Drive -- 4. Backup Using Your Operating System's Native Backup Application -- 5. Automatic Backup vs. Manual Backup.
F. Secure Your Cloud Data and Internet Accounts (and Back Them Up) -- 1. Secure Your Important Online Accounts -- 2. Secure Your "Unimportant Accounts" as Best You Can -- G. Consider Encryption to Secure Data on Your Local Device -- 1. To Encrypt or Not to Encrypt? That Is the Question -- 2. Encryption by the Application -- 3. File and Folder Encryption by the Operating System -- 4. Full Disk Encryption -- 5. Encryption Summary -- H. Organize Your Data-Your Files and Folders -- 1. Basic File Organization Concepts -- 2. Storage Location -- I. Conclusion -- CHAPTER 10 Secure Your Network and Internet Use -- A. Introduction -- B. Mentally Assess Your Home Network -- C. Identify Parts of Your Home Network -- D. Internet Connection -- E. Modem -- F. Router and Wi-Fi -- 1. Learn About Basic Wi-Fi Routing -- 2. Log In to Your Router Administration Portal -- 3. Secure Your Router Administration Username and Password -- 4. Update Router Firmware -- 5. Secure the Wi-Fi Network Password and Ensure the Network Is Encrypted -- 6. Evaluate Your Wi-Fi Network Name -- 7. Disable Wi-Fi Protected Setup -- 8. Disable Remote Access Features You Don't Need -- 9. Enable Your Router's Firewall (If Available) -- 10. Disable Universal Plug and Play If You Don't Need It -- 11. Run Your Router's Security Self-Assessment Function (If Available) -- 12. Enable a Guest Network on Your Router (If Available) -- 13. Check Your Router's Physical Security -- 14. Learn About Additional Router and Wi-Fi Security Features -- 15. Wi-Fi Router Conclusion -- G. Software Firewalls (Encore for Your Laptops and Desktops) -- H. Review Device Software That Accesses the Internet (Encore for What Is Phoning Home) -- I. How Your Data Is Transmitted -- J. Equipment on the Network -- 1. Printers, Scanners, Fax Machines, All-in-Ones, and More -- 2. Network Attached Storage.
K. The "Internet of Things" and Smart Homes -- L. Reduce Your Attack Surface: Disconnect When Not Needed -- M. More About Networks for the Very Curious -- 1. Windows Task Manager -- 2. Windows Resource Monitor -- 3. Windows Firewall -- 4. Windows Firewall with Advanced Security -- 5. Windows Commands Regarding Network Activity -- 6. Mac Applications and Commands Regarding Network Activity -- 7. Install a Free Software Firewall -- N. Conclusion -- CHAPTER 11 Secure Your Family, Children, and Seniors -- A. Introduction -- B. Children -- 1. Assessment -- 2. Your Parental "Privacy Policy" -- 3. Educating Your Child to Make Good Decisions -- 4. Reviewing Your Child's Devices and Computer Usage -- 5. Sample Guidelines or Rules of Conduct -- 6. Reviewing the Data That Is Posted About Your Children -- C. Seniors -- D. Conclusion -- CHAPTER 12 Secure Yourself When You Travel -- A. Introduction -- B. Devices and Travel -- 1. Preventing Loss or Theft -- 2. Using Someone Elses Device -- C. Internet Access and Travel -- D. Data and Travel -- 1. Data You Bring (Data at Rest) -- 2. Data You Access (Data in Transit) -- E. Miscellaneous Anti-Fraud When You Travel -- F. Special Considerations When Traveling to Certain Countries -- G. Conclusion -- CHAPTER 13 Secure the Work Office -- A. Introduction -- B. The Workplace Mental Assessment -- C. Physically Secure Your Office -- 1. Visitor Entry -- 2. Locks and Doors -- 3. Alarm Systems and Video Surveillance -- 4. The "Plain View" Doctrine in Your Office -- D. Securing Your Employees and Coworkers -- 1. Screening and the Insider Threat -- 2. Training -- 3. Shadow IT in the Office -- 4. Acceptable Use of Workplace Computers -- E. Secure the Devices in Your Office -- F. Secure the Data in Your Office -- 1. Network Storage Devices in Your Office -- 2. Documents and Data in the Cloud -- 3. E-mail -- 4. Data at Rest.
5. Data in Transit.
Record Nr. UNINA-9910825788303321
Bandler John  
Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity for the new frontier : reforming the Federal Information Security Management Act : hearing before the Committee on Oversight and Reform, House of Representatives, One Hundred Seventeenth Congress, second session, January 11, 2022
Cybersecurity for the new frontier : reforming the Federal Information Security Management Act : hearing before the Committee on Oversight and Reform, House of Representatives, One Hundred Seventeenth Congress, second session, January 11, 2022
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2022
Descrizione fisica 1 online resource (iii, 51 pages)
Soggetto topico Computer security - Government policy - United States
Computer networks - Security measures - United States
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity for the new frontier
Record Nr. UNINA-9910717273703321
Washington : , : U.S. Government Publishing Office, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The cybersecurity partnership between the private sector and our government : protecting our national and economic security : joint hearing before the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, first session, March 7, 2013
The cybersecurity partnership between the private sector and our government : protecting our national and economic security : joint hearing before the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, first session, March 7, 2013
Pubbl/distr/stampa Washington : , : U.S. Government Printing Office, , 2014
Descrizione fisica 1 online resource (iii, 108 pages) : illustrations
Collana S. hrg.
Soggetto topico Computer networks - Security measures - United States
Cyberinfrastructure - Security measures - United States
Cyberspace - Security measures - United States
Public-private sector cooperation - United States
Cyberterrorism - United States - Prevention
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity Partnership between the Private Sector and Our Government
Record Nr. UNINA-9910703496703321
Washington : , : U.S. Government Printing Office, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity recommendations for the next administration [[electronic resource] ] : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008
Cybersecurity recommendations for the next administration [[electronic resource] ] : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008
Pubbl/distr/stampa Washington : , : U.S. G.P.O., , 2009
Descrizione fisica 1 online resource (iii, 37 pages)
Soggetto topico Computer security - United States
Computer networks - Security measures - United States
Cyberterrorism - United States - Prevention
National security - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity recommendations for the next administration
Record Nr. UNINA-9910702994303321
Washington : , : U.S. G.P.O., , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity regulation harmonization : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, June 21, 2017
Cybersecurity regulation harmonization : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, June 21, 2017
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2018
Descrizione fisica 1 online resource (iii, 117 pages) : illustrations
Collana S. hrg.
Soggetto topico Computer networks - Security measures - United States
Cyberspace - Security measures - United States
Computer security - Law and legislation - United States
Data protection - Government policy - United States
Cyberterrorism - United States - Prevention
Cyberinfrastructure - Security measures - United States
Computer networks - Security measures
Computer security - Law and legislation
Cyberterrorism - Prevention
Data protection - Government policy
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity regulation harmonization
Record Nr. UNINA-9910711345003321
Washington : , : U.S. Government Publishing Office, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
Pubbl/distr/stampa Washington, D.C., : National Academy Press, c2002
Descrizione fisica 1 online resource (50 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer networks - Security measures
Computer security - United States
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-280-18387-X
9786610183876
0-309-50929-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""1 Cybersecurity Today and Tomorrow""; ""2 Excerpts from Earlier CSTB Reports""; ""What Is CSTB?""
Record Nr. UNINA-9910456045703321
Washington, D.C., : National Academy Press, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
Pubbl/distr/stampa Washington, D.C., : National Academy Press, c2002
Descrizione fisica 1 online resource (50 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer networks - Security measures
Computer security - United States
Computer security
ISBN 0-309-17005-2
1-280-18387-X
9786610183876
0-309-50929-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""1 Cybersecurity Today and Tomorrow""; ""2 Excerpts from Earlier CSTB Reports""; ""What Is CSTB?""
Record Nr. UNINA-9910780139303321
Washington, D.C., : National Academy Press, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
Pubbl/distr/stampa Washington, D.C., : National Academy Press, c2002
Descrizione fisica 1 online resource (50 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures - United States
Computer networks - Security measures
Computer security - United States
Computer security
ISBN 0-309-17005-2
1-280-18387-X
9786610183876
0-309-50929-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""1 Cybersecurity Today and Tomorrow""; ""2 Excerpts from Earlier CSTB Reports""; ""What Is CSTB?""
Record Nr. UNINA-9910829182503321
Washington, D.C., : National Academy Press, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Vulnerability Identification and Notification Act : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 3045, to amend the Homeland Security Act of 2012 to protect United States critical infrastructure by ensuring that the Cybersecurity and Infrastructure Security Agency has the legal tools it needs to notify private and public sector entities put at risk by cybersecurity vulnerabilities in the networks and systems that control critical assets of the United States
Cybersecurity Vulnerability Identification and Notification Act : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 3045, to amend the Homeland Security Act of 2012 to protect United States critical infrastructure by ensuring that the Cybersecurity and Infrastructure Security Agency has the legal tools it needs to notify private and public sector entities put at risk by cybersecurity vulnerabilities in the networks and systems that control critical assets of the United States
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (ii, 13 pages)
Collana Report / 116th Congress, 2d session, Senate
Soggetto topico Cyberterrorism - United States - Prevention
Computer networks - Security measures - United States
Computer networks - Security measures
Cyberterrorism - Prevention
Soggetto genere / forma Legislative materials.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity Vulnerability Identification and Notification Act
Record Nr. UNINA-9910713729703321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity workforce, urgent need for DHS to take actions to identify its position and critical skill requirements : report to congressional committees
Cybersecurity workforce, urgent need for DHS to take actions to identify its position and critical skill requirements : report to congressional committees
Pubbl/distr/stampa [Washington, D.C.] : , : United States Government Accountability Office, , 2018
Descrizione fisica 1 online resource (iii, 41 pages) : color illustrations
Soggetto topico Computer networks - Security measures - United States
Cyberterrorism - United States - Prevention
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity workforce, urgent need for DHS to take actions to identify its position and critical skill requirements
Record Nr. UNINA-9910706888403321
[Washington, D.C.] : , : United States Government Accountability Office, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...