دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: امنیت ویرایش: 1 نویسندگان: Joseph Steinberg سری: For Dummies ISBN (شابک) : 1119560322, 9781119560326 ناشر: Wiley سال نشر: 2019 تعداد صفحات: 369 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 11 مگابایت
کلمات کلیدی مربوط به کتاب امنیت سایبری برای آدمک ها: امنیت، امنیت سایبری، حریم خصوصی، ارزیابی ریسک، امنیت شبکه، برای آدمکها، پاسخ به حوادث، شبکههای اجتماعی، مهندسی اجتماعی، فیشینگ، شغل، مدلهای تهدید، امنیت فیزیکی، ابتدایی، پشتیبانگیری
در صورت تبدیل فایل کتاب Cybersecurity For Dummies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت سایبری برای آدمک ها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
از کسب و کار و خانواده خود در برابر حملات سایبری محافظت کنید امنیت سایبری حفاظت در برابر استفاده غیرمجاز یا مجرمانه از داده های الکترونیکی و عملکرد تضمین یکپارچگی، محرمانه بودن و در دسترس بودن اطلاعات است. "امن سایبری" به این معنی است که یک شخص یا سازمان هم از خود در برابر حملات مجرمان سایبری و دیگر شرورهای آنلاین محافظت کرده و هم اطمینان داده است که در صورت حمله توانایی بازیابی را دارد. اگر محافظت از کسب و کار یا خانواده خود در برابر تهدیدات امنیت سایبری در لیست کارهای شما قرار دارد، Cybersecurity For Dummies شما را با اصول اولیه امنیت سایبری آشنا می کند! شما یاد خواهید گرفت که چه تهدیداتی وجود دارد، و چگونه می توانید این تهدیدات را شناسایی، محافظت کنید، شناسایی کنید، و به آنها پاسخ دهید، و همچنین چگونه می توانید در صورت نقض قوانین بازیابی کنید! • چه کسی و چرا تهدیدات امنیت سایبری • مفاهیم اساسی امنیت سایبری • برای امنیت سایبری چه باید کرد • مشاغل امنیت سایبری • برای حفظ امنیت سایبری در آینده به چه چیزی فکر کنیم اکنون زمان شناسایی آسیب پذیری هایی است که ممکن است شما را قربانی جرایم سایبری کند – و قبل از اینکه دیر شود از خود دفاع کنید.
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! • The who and why of cybersecurity threats • Basic cybersecurity concepts • What to do to be cyber-secure • Cybersecurity careers • What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime ― and to defend yourself before it is too late.
Introduction About This Book Foolish Assumptions Conventions Used in This Book Icons Used in This Book Beyond This Book Where to Go from Here Part 1: Getting Started with Cybersecurity Chapter 1: What Exactly Is Cybersecurity? Cybersecurity Means Different Things to Different Folks Cybersecurity Is a Constantly Moving Target Looking at the Risks That Cybersecurity Mitigates Chapter 2: Getting to Know Common Cyberattacks Attacks That Inflict Damage Impersonation Interception Data Theft Malware Poisoned Web Service Attacks Network Infrastructure Poisoning Malvertising Exploiting Maintenance Difficulties Advanced Attacks Chapter 3: Bad Guys and Accidental Bad Guys: The Folks You Must Defend Against Bad Guys and Good Guys Are Relative Terms Bad Guys Up to No Good Cyberattackers and Their Colored Hats Monetizing Their Actions Dealing with Nonmalicious Threats Defending against These Attackers Addressing Risks through Various Methods Part 2: Improving Your Own Personal Security Chapter 4: Evaluating Your Current Cybersecurity Posture Identifying Ways You May Be Less than Secure Identifying Risks Protecting against Risks Evaluating Your Current Security Measures Privacy 101 Banking Online Safely Safely Using Smart Devices Chapter 5: Enhancing Physical Security Understanding Why Physical Security Matters Taking Inventory Locating Your Vulnerable Data Creating and Executing a Physical Security Plan Implementing Physical Security Security for Mobile Devices Realizing That Insiders Pose the Greatest Risks Part 3: Protecting Yourself from Yourself Chapter 6: Securing Your Accounts Realizing That You’re a Target Securing Your External Accounts Securing Data Associated with User Accounts Securing Data with Parties That You’ve Interacted With Securing Data at Parties That You Haven’t Interacted With Chapter 7: Passwords Passwords: The Primary Form of Authentication Avoiding Simplistic Passwords Password Considerations Creating Memorable, Strong Passwords Knowing When to Change Your Password Changing Passwords after a Breach Providing Passwords to Humans Storing Passwords Transmitting Passwords Discovering Alternatives to Passwords Chapter 8: Preventing Social Engineering Don’t Trust Technology More than You Would People Types of Social Engineering Attacks Six Principles Social Engineers Exploit Don’t Overshare on Social Media Leaking Data by Sharing Information as Part of Viral Trends Identifying Fake Social Media Connections Using Bogus Information Using Security Software General Cyberhygiene Can Help Prevent Social Engineering Part 4: Cybersecurity for Businesses and Organizations Chapter 9: Securing Your Small Business Making Sure Someone Is in Charge Watching Out for Employees Considering Cyber Insurance Complying with Regulations and Compliance Handling Internet Access Managing Power Issues Chapter 10: Cybersecurity and Big Businesses Utilizing Technological Complexity Managing Custom Systems Continuity Planning and Disaster Recovery Looking at Regulations Deeper Pockets — and Insured Considering Employees, Consultants, and Partners Looking at the Chief Information Security Officer’s Role Part 5: Handling a Security Incident (This Is a When, Not an If) Chapter 11: Identifying a Security Breach Identifying Overt Breaches Detecting Covert Breaches Chapter 12: Recovering from a Security Breach An Ounce of Prevention Is Worth Many Tons of Response Stay Calm and Act Now with Wisdom Bring in a Pro Recovering from a Breach without a Pro’s Help Reinstall Damaged Software Dealing with Stolen Information Recovering When Your Data Is Compromised at a Third Party Part 6: Backing Up and Recovery Chapter 13: Backing Up Backing Up Is a Must Looking at the Different Types of Backups Exploring Backup Tools Knowing Where to Back Up Knowing Where Not to Store Backups Encrypting Backups Figuring Out How Often You Should Backup Disposing of Backups Testing Backups Conducting Cryptocurrency Backups Backing Up Passwords Creating a Boot Disk Chapter 14: Resetting Your Device Exploring Two Types of Resets Rebuild Your Device after a Hard Reset Chapter 15: Restoring from Backups You Will Need to Restore Wait! Do Not Restore Yet! Restoring from Full Backups of Systems Restoring from Incremental Backups Dealing with Deletions Excluding Files and Folders Understanding Archives Restoring Using Backup Tools Returning Backups to Their Proper Locations Restoring to Non-Original Locations Never Leave Your Backups Connected Restoring from Encrypted Backups Testing Backups Restoring Cryptocurrency Booting from a Boot Disk Part 7: Looking toward the Future Chapter 16: Pursuing a Cybersecurity Career Professional Roles in Cybersecurity Exploring Career Paths Starting Out in Information Security Exploring Popular Certifications Overcoming a Criminal Record Looking at Other Professions with a Cybersecurity Focus Chapter 17: Emerging Technologies Bring New Threats Relying on the Internet of Things Using Cryptocurrencies and Blockchain Optimizing Artificial Intelligence Experiencing Virtual Reality Transforming Experiences with Augmented Reality Part 8: The Part of Tens Chapter 18: Ten Ways You Can Improve Your Cybersecurity without Spending a Fortune Understand That You Are a Target Use Security Software Encrypt Sensitive Information Back Up Often Do Not Share Passwords and Other Login Credentials Use Proper Authentication Use Social Media Wisely Segregate Internet Access Use Public Wi-Fi Safely Hire a Pro Chapter 19: Ten Lessons from Major Cybersecurity Breaches Marriott Target Sony Pictures Office of Personnel Management Anthem Chapter 20: Ten Ways to Safely Use Public Wi-Fi Use Your Cellphone as a Mobile Hotspot Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi Don’t Perform Sensitive Tasks over Public Wi-Fi Don’t Reset Passwords When Using Public Wi-Fi Use a VPN Service Use Tor Use Encryption Turn Off Sharing Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks Understand the Difference between True Public Wi-Fi and Shared Wi-Fi Index About the Author Connect with Dummies End User License Agreement