An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.
It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use. Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.
Duane C. Wilson is Founder and CEO of Wilson Innovative Solutions LLC, a firm that provides cybersecurity training, research, and consulting for businesses.
Series Foreword 1 Cybersecurity Origins 2 Foundations 3 Cryptography Demystified 4 Cybersecurity in Layers 5 Who Attacked Me? 6 Malware in Action 7 Modern-Day Applications 8 Cybersecurity for the Future Glossary Notes Further Reading Index
An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.
It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use. Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.
Author
Duane C. Wilson is Founder and CEO of Wilson Innovative Solutions LLC, a firm that provides cybersecurity training, research, and consulting for businesses.
Series Foreword 1 Cybersecurity Origins 2 Foundations 3 Cryptography Demystified 4 Cybersecurity in Layers 5 Who Attacked Me? 6 Malware in Action 7 Modern-Day Applications 8 Cybersecurity for the Future Glossary Notes Further Reading Index
We, our affiliates, and our providers use cookies and similar technologies to understand how you use our site, optimize its functionality, to create more valuable experiences for you, to keep our site secure and functional, and deliver advertising and other content tailored to your interests.Read MoreBy clicking on I agree below, you consent to our use of cookies and similar technologies, as described in our Privacy Policy (see section "Other Information Collected Using Technology"). Please note that by declining cookies other than those essential to your use of our site, you may not be able to experience the site's full services and features.
We, our affiliates, and providers working on our behalf use cookies to analyze our websites, provide social sharing features, deliver content, and communicate with you to provide support. We also use cookies to deliver personalized ads and disclose information about your use of our site with our advertising providers for this purpose. View our Privacy Policy to learn more and manage your privacy choices.