Seese M. — Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometrics
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Firewalls, ... Access Cards and Biometrics
Автор: Seese M.
Аннотация:
The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and — to add insult to injury — latch onto our PCs to perpetuate their crimes. Modern corporations do their best to hammer home the message of security through training, communications, and outright begging. The message often falls on deaf ears, not because employees want to make their workplaces unsafe, but rather, because the topic is so complex and wide-ranging that it simply is overwhelming. As an information security professional, it is my charge to make the online world safer for all of us. None of us tolerates a crime spree in our neighborhood. Likewise, we should not tolerate the current crime wave that is sweeping the Internet, one which truly threatens to stifle the e-commerce and e-communications that we have come to know and rely on. They say a little knowledge is a dangerous thing. I agree. People need more than a little knowledge to be safe online. They need to understand how encryption, the Internet, and wireless work so that they can put the pieces together — literally like a jigsaw puzzle — to reveal the image of a more secure online world. It is my goal to craft those pieces in such a way that the average reader will understand these technologies, and therefore understand how to apply them to both their corporate and personal cyberselves. This book should be read by anyone who cares about the security and privacy of their online information, and wants to know how to take steps to protect it ... and that should be everyone. This book should be read by anyone who wants to "do the right thing" and ensure that they do not inadvertently compromise their employer's, or their own, sensitive information ... and that should be everyone. This book should be read by anyone who believes that crime is crime, it should be stopped, and wants to know what concrete steps he or she can be take to reduce cybercrime and minimize its impacts ... and that should be everyone.