Description
Book Synopsis: An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.
It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.
Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.
Details
Protect yourself from cyber attacks with the Cybersecurity book from The MIT Press Essential Knowledge series. In today's interconnected world, every device we use is vulnerable to data breaches and cyber threats. From smartphones to smart homes, we are constantly at risk. This accessible guide by cybersecurity expert Duane Wilson provides valuable insights into cryptography, malware, blockchain, and other essential topics to ensure that you stay safe online.
Confidentiality, integrity, availability, authentication, authorization, and non-repudiation are the core principles of cybersecurity defense. In this book, Wilson explains how cryptography helps maintain confidentiality and how different layers of defense can shield you from cyber attacks. Gain a deeper understanding of cyber risks, threats, and vulnerabilities, and learn about the cyber kill chain and various forms of malware. With this knowledge, you'll be well-equipped to protect yourself from the ever-evolving threats lurking on the internet.
Discover the practical applications of cybersecurity in everyday life. Look at how end-to-end security protects your sensitive information, enabling secure ecommerce transactions and safeguarding your smart devices. Explore the potential of blockchain technology in enhancing digital security. With this comprehensive book, you'll gain the knowledge needed to make informed decisions in the digital world.
The future of cybersecurity is constantly evolving, and this book provides valuable insights into the research shaping the industry. Stay ahead of the curve and learn about the innovations that will shape the overall threat landscape. Arm yourself with the knowledge found in Cybersecurity and take control of your online safety.
Get your copy of Cybersecurity today and equip yourself with the knowledge needed to navigate the digital world securely. Click here to purchase your copy now.
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam
$25.00


C++ Crash Course: A Fast-Paced Introduction
$32.96


CompTIA PenTest+ Study Guide: Exam PT0-002
$45.86


Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e
$44.99


$3.99


CISM Certified Information Security Manager Bundle, Second Edition
$90.00


The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
$17.99


The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
$10.65
