Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler |
Autore | Bandler John |
Pubbl/distr/stampa | Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017] |
Descrizione fisica | 1 online resource (xxiv, 392 pages) : illustrations |
Disciplina | 005.8024/34 |
Soggetto topico |
Computer security - Law and legislation - United States
Computer networks - Security measures - United States Law offices - United States Data protection - Law and legislation - United States |
ISBN | 1-63425-908-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgments -- Foreword -- CHAPTER 1 The Need for Cybersecurity -- Why This Book? -- What You Should Do Right Now -- How This Book Is Organized -- You Can Improve Your Own Cybersecurity -- CHAPTER 2 The Black Market for Your Data: The Cybercrime Economy -- A. Introduction -- B. It Is a Big Business -- C. It Is International -- D. Digital Currency -- E. Payment Card Fraud: An Example of the Cybercrime Economy -- F. Other Cybercrime and Identity Theft Schemes -- 1. Financial Account Takeover -- 2. New Financial Account Opening -- 3. Infected Computers -- 4. Phishing, Spam, and Internet Account Takeover -- 5. Other Ways to Obtain Passwords -- 6. E-mail Account Compromise (Hack) -- 7. Ransomware -- 8. Scareware and Technical Support Scams -- G. Government and Law Enforcement Response -- CHAPTER 3 Advertising: Another Market for Your Data -- A. Introduction -- B. Corporate Collection and Use of Your Information and Data -- C. What (or Who) Is the Product? -- D. Privacy Policies and the Consumer -- E. Corporate Data Storage -- F. Conclusion -- CHAPTER 4 Basic Information Security Principles -- A. Introduction -- B. Physical Security -- 1. Theft and Damage -- 2. Controlling Access to Your Devices at Home -- C. Confidentiality -- 1. Authentication -- 2. Encryption -- D. Availability -- 1. "If It Ain't Broke, Don't Fix It." But Maybe It Is Broken After All? -- 2. Availability, Authentication, and Confidentiality -- 3. Availability and Ransomware and Other Malicious Destruction -- 4. Availability and Backup -- 5. Business Continuity and Disaster Recovery Planning -- E. Integrity -- F. The Principle of "Least Privilege" and "Need to Know" -- 1. Data Access -- 2. Administrator Rights and Accounts -- G. Information Classification -- H. Conclusion.
CHAPTER 5 Basic Computer Principles -- A. Introduction -- B. The Evolution of Computing -- 1. Storing Information -- 2. Processing Information -- C. Computer Hardware -- 1. Case -- 2. Power Supply -- 3. Display -- 4. Ports: USB, Parallel, Serial, VGA, DVI, HDMI, DP -- 5. Input Devices (Keyboard, Mouse, Microphone, Camera, and More) -- 6. Network Interface Controller -- 7. Processor (Central Processing Unit, Microprocessor) -- 8. Random Access Memory -- 9. Motherboard (System Board) -- 10. Internal Data Storage -- 11. External Data Storage -- 12. External Devices Such as Scanners and Printers -- D. Programs That Run on Your Computer: BIOS, Operating System, Applications -- 1. BIOS -- 2. Operating System -- 3. File System -- 4. Applications (Software) -- 5. Virtual Ports -- E. From Desktop to Miniature: Laptop, Notebook, Tablet, Smartphone, Smartwatch, IoT -- F. Computers on Steroids: The Cloud and Data Centers -- G. Encryption of Data at Rest -- H. Conclusion -- CHAPTER 6 Basic Networking and the Internet -- A. Introduction -- B. Network Interface Controller -- C. Internet -- 1. Dial-up -- 2. Cable Internet (Broadband) -- 3. Phone Company Internet (DSL, FiOS) -- 4. Cellular Company Internet -- 5. Satellite Internet -- D. Modem -- E. Router -- F. Internet Communication 101 -- 1. IP Addresses on the Internet -- 2. IP Addresses on Your Local Network: Network Address Translation -- 3. Ports: Virtual Router Ports and Computer Ports -- 4. TCP/UDP Internet Protocols (Language) -- 5. Network Layers -- G. Wired Networking -- H. Wireless Networking -- I. Encryption in Transit -- J. Conclusion -- CHAPTER 7 Start Securing Yourself -- A. Introduction -- B. Set Your Cybersecurity Dial -- C. Turning Up Your Security Dial Is an Investment -- D. There Is No Perfect Product or Solution -- E. Let's Get Started (If You Haven't Already). 1. Put a Password on All of Your Computing Devices -- 2. Enable the "Auto Lock" Feature -- 3. Run an Anti-Malware Scan on Your Laptop and Desktop -- 4. Disconnect from the Internet When You Don't Need It -- 5. Use Complex and Unique Passwords -- 6. Enable "Two-Step" Login -- 7. Ensure That Your Home Wi-Fi Network Is Password Protected -- F. Conclusion -- CHAPTER 8 Secure Your Devices -- A. Introduction -- B. Mentally Assess Your Devices -- C. Getting Started -- D. Device Inventory (Scavenger Hunt) -- 1. Device Description -- 2. Ownership and Expectation of Privacy -- E. Access: Physical Control -- F. Access: Electronic (Technical) -- 1. Device Password Complexity -- 2. Auto Lock Feature and Affirmatively Locking Your Device -- G. User Accounts: Usage by Whom and for What Purposes? -- 1. Administrator Accounts vs. User Accounts -- 2. Segregation of User Accounts -- H. Operating System -- I. Applications (Software) -- J. Data Stored on Device -- K. Data the Device Can Access (Cloud Data) -- L. Anti-Malware -- M. Internet Access -- N. Firewall -- O. Decommissioning Your Device -- 1. Basic Decommissioning Steps -- P. Conclusion -- CHAPTER 9 Secure Your Data -- A. Introduction -- B. Mentally Assess Your Data and What It Means to You -- 1. Assess Your Own Skills and Memory -- 2. Assess by Data Type -- 3. Assess by Data Importance and Risk -- 4. Assess by Data Storage Location and Provider -- 5. Assessment Wrap-Up -- C. Getting Started -- D. Secure Your Devices (Encore) -- E. Back Up Your Data -- 1. Manually Back Up Data to an External Hard Drive -- 2. Make Incremental Backups of Your Most Important Documents -- 3. Manually Back Up Data from Your Cloud Accounts to a Local Device or External Hard Drive -- 4. Backup Using Your Operating System's Native Backup Application -- 5. Automatic Backup vs. Manual Backup. F. Secure Your Cloud Data and Internet Accounts (and Back Them Up) -- 1. Secure Your Important Online Accounts -- 2. Secure Your "Unimportant Accounts" as Best You Can -- G. Consider Encryption to Secure Data on Your Local Device -- 1. To Encrypt or Not to Encrypt? That Is the Question -- 2. Encryption by the Application -- 3. File and Folder Encryption by the Operating System -- 4. Full Disk Encryption -- 5. Encryption Summary -- H. Organize Your Data-Your Files and Folders -- 1. Basic File Organization Concepts -- 2. Storage Location -- I. Conclusion -- CHAPTER 10 Secure Your Network and Internet Use -- A. Introduction -- B. Mentally Assess Your Home Network -- C. Identify Parts of Your Home Network -- D. Internet Connection -- E. Modem -- F. Router and Wi-Fi -- 1. Learn About Basic Wi-Fi Routing -- 2. Log In to Your Router Administration Portal -- 3. Secure Your Router Administration Username and Password -- 4. Update Router Firmware -- 5. Secure the Wi-Fi Network Password and Ensure the Network Is Encrypted -- 6. Evaluate Your Wi-Fi Network Name -- 7. Disable Wi-Fi Protected Setup -- 8. Disable Remote Access Features You Don't Need -- 9. Enable Your Router's Firewall (If Available) -- 10. Disable Universal Plug and Play If You Don't Need It -- 11. Run Your Router's Security Self-Assessment Function (If Available) -- 12. Enable a Guest Network on Your Router (If Available) -- 13. Check Your Router's Physical Security -- 14. Learn About Additional Router and Wi-Fi Security Features -- 15. Wi-Fi Router Conclusion -- G. Software Firewalls (Encore for Your Laptops and Desktops) -- H. Review Device Software That Accesses the Internet (Encore for What Is Phoning Home) -- I. How Your Data Is Transmitted -- J. Equipment on the Network -- 1. Printers, Scanners, Fax Machines, All-in-Ones, and More -- 2. Network Attached Storage. K. The "Internet of Things" and Smart Homes -- L. Reduce Your Attack Surface: Disconnect When Not Needed -- M. More About Networks for the Very Curious -- 1. Windows Task Manager -- 2. Windows Resource Monitor -- 3. Windows Firewall -- 4. Windows Firewall with Advanced Security -- 5. Windows Commands Regarding Network Activity -- 6. Mac Applications and Commands Regarding Network Activity -- 7. Install a Free Software Firewall -- N. Conclusion -- CHAPTER 11 Secure Your Family, Children, and Seniors -- A. Introduction -- B. Children -- 1. Assessment -- 2. Your Parental "Privacy Policy" -- 3. Educating Your Child to Make Good Decisions -- 4. Reviewing Your Child's Devices and Computer Usage -- 5. Sample Guidelines or Rules of Conduct -- 6. Reviewing the Data That Is Posted About Your Children -- C. Seniors -- D. Conclusion -- CHAPTER 12 Secure Yourself When You Travel -- A. Introduction -- B. Devices and Travel -- 1. Preventing Loss or Theft -- 2. Using Someone Elses Device -- C. Internet Access and Travel -- D. Data and Travel -- 1. Data You Bring (Data at Rest) -- 2. Data You Access (Data in Transit) -- E. Miscellaneous Anti-Fraud When You Travel -- F. Special Considerations When Traveling to Certain Countries -- G. Conclusion -- CHAPTER 13 Secure the Work Office -- A. Introduction -- B. The Workplace Mental Assessment -- C. Physically Secure Your Office -- 1. Visitor Entry -- 2. Locks and Doors -- 3. Alarm Systems and Video Surveillance -- 4. The "Plain View" Doctrine in Your Office -- D. Securing Your Employees and Coworkers -- 1. Screening and the Insider Threat -- 2. Training -- 3. Shadow IT in the Office -- 4. Acceptable Use of Workplace Computers -- E. Secure the Devices in Your Office -- F. Secure the Data in Your Office -- 1. Network Storage Devices in Your Office -- 2. Documents and Data in the Cloud -- 3. E-mail -- 4. Data at Rest. 5. Data in Transit. |
Record Nr. | UNINA-9910825788303321 |
Bandler John
![]() |
||
Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity for the new frontier : reforming the Federal Information Security Management Act : hearing before the Committee on Oversight and Reform, House of Representatives, One Hundred Seventeenth Congress, second session, January 11, 2022 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2022 |
Descrizione fisica | 1 online resource (iii, 51 pages) |
Soggetto topico |
Computer security - Government policy - United States
Computer networks - Security measures - United States |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity for the new frontier |
Record Nr. | UNINA-9910717273703321 |
Washington : , : U.S. Government Publishing Office, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The cybersecurity partnership between the private sector and our government : protecting our national and economic security : joint hearing before the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, first session, March 7, 2013 |
Pubbl/distr/stampa | Washington : , : U.S. Government Printing Office, , 2014 |
Descrizione fisica | 1 online resource (iii, 108 pages) : illustrations |
Collana | S. hrg. |
Soggetto topico |
Computer networks - Security measures - United States
Cyberinfrastructure - Security measures - United States Cyberspace - Security measures - United States Public-private sector cooperation - United States Cyberterrorism - United States - Prevention |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity Partnership between the Private Sector and Our Government |
Record Nr. | UNINA-9910703496703321 |
Washington : , : U.S. Government Printing Office, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity recommendations for the next administration [[electronic resource] ] : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008 |
Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 2009 |
Descrizione fisica | 1 online resource (iii, 37 pages) |
Soggetto topico |
Computer security - United States
Computer networks - Security measures - United States Cyberterrorism - United States - Prevention National security - United States |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity recommendations for the next administration |
Record Nr. | UNINA-9910702994303321 |
Washington : , : U.S. G.P.O., , 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity regulation harmonization : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, June 21, 2017 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
Descrizione fisica | 1 online resource (iii, 117 pages) : illustrations |
Collana | S. hrg. |
Soggetto topico |
Computer networks - Security measures - United States
Cyberspace - Security measures - United States Computer security - Law and legislation - United States Data protection - Government policy - United States Cyberterrorism - United States - Prevention Cyberinfrastructure - Security measures - United States Computer networks - Security measures Computer security - Law and legislation Cyberterrorism - Prevention Data protection - Government policy |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity regulation harmonization |
Record Nr. | UNINA-9910711345003321 |
Washington : , : U.S. Government Publishing Office, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council |
Pubbl/distr/stampa | Washington, D.C., : National Academy Press, c2002 |
Descrizione fisica | 1 online resource (50 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures - United States
Computer networks - Security measures Computer security - United States Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-18387-X
9786610183876 0-309-50929-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""1 Cybersecurity Today and Tomorrow""; ""2 Excerpts from Earlier CSTB Reports""; ""What Is CSTB?"" |
Record Nr. | UNINA-9910456045703321 |
Washington, D.C., : National Academy Press, c2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council |
Pubbl/distr/stampa | Washington, D.C., : National Academy Press, c2002 |
Descrizione fisica | 1 online resource (50 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures - United States
Computer networks - Security measures Computer security - United States Computer security |
ISBN |
0-309-17005-2
1-280-18387-X 9786610183876 0-309-50929-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""1 Cybersecurity Today and Tomorrow""; ""2 Excerpts from Earlier CSTB Reports""; ""What Is CSTB?"" |
Record Nr. | UNINA-9910780139303321 |
Washington, D.C., : National Academy Press, c2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity today and tomorrow [[electronic resource] ] : pay now or pay later / / Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council |
Pubbl/distr/stampa | Washington, D.C., : National Academy Press, c2002 |
Descrizione fisica | 1 online resource (50 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures - United States
Computer networks - Security measures Computer security - United States Computer security |
ISBN |
0-309-17005-2
1-280-18387-X 9786610183876 0-309-50929-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""1 Cybersecurity Today and Tomorrow""; ""2 Excerpts from Earlier CSTB Reports""; ""What Is CSTB?"" |
Record Nr. | UNINA-9910829182503321 |
Washington, D.C., : National Academy Press, c2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity Vulnerability Identification and Notification Act : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 3045, to amend the Homeland Security Act of 2012 to protect United States critical infrastructure by ensuring that the Cybersecurity and Infrastructure Security Agency has the legal tools it needs to notify private and public sector entities put at risk by cybersecurity vulnerabilities in the networks and systems that control critical assets of the United States |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
Descrizione fisica | 1 online resource (ii, 13 pages) |
Collana | Report / 116th Congress, 2d session, Senate |
Soggetto topico |
Cyberterrorism - United States - Prevention
Computer networks - Security measures - United States Computer networks - Security measures Cyberterrorism - Prevention |
Soggetto genere / forma | Legislative materials. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity Vulnerability Identification and Notification Act |
Record Nr. | UNINA-9910713729703321 |
Washington : , : U.S. Government Publishing Office, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity workforce, urgent need for DHS to take actions to identify its position and critical skill requirements : report to congressional committees |
Pubbl/distr/stampa | [Washington, D.C.] : , : United States Government Accountability Office, , 2018 |
Descrizione fisica | 1 online resource (iii, 41 pages) : color illustrations |
Soggetto topico |
Computer networks - Security measures - United States
Cyberterrorism - United States - Prevention |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity workforce, urgent need for DHS to take actions to identify its position and critical skill requirements |
Record Nr. | UNINA-9910706888403321 |
[Washington, D.C.] : , : United States Government Accountability Office, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|