Cyber Curiosity
eBook - ePub

Cyber Curiosity

A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Cyber Curiosity

A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World

About this book

Every year, thousands of people fall victim to phone scams, phishing attacks, and identity theft. But the consequences of these attacks are completely preventable if you practice cybersecurity awareness.

Many associate cybersecurity with large corporations, so why is it important for you? Cyber Curiosity: A Beginner's Guide to Cybersecurity-How to Protect Yourself in the Modern World answers this through the stories of individuals and corporations alike. You will learn why you should keep separate passwords and how cybercrimes are committed. You will read about:

  • The couple who set up a smart security camera system only to find that it was recording them for the world to see
  • How a ransomware attack brought the DCH hospital system of West Alabama to its knees
  • What it's like being a victim of a romance scam resulting in over two million dollars in damages

Cyber Curiosity breaks down these stories and pulls in the experts to help equip you with the tools needed to bolster your own cybersecurity awareness. It's not all about the big tech data breaches on the news-cybersecurity is about making the right decisions to protect yourself, your loved ones, and your information.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cyber Curiosity by Lakeidra Smith in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Part 1

What is Cybersecurity

Chapter 1
Redefining Cybersecurity

“The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction, and Resilience. Do remember: Cybersecurity is much more than an IT topic.”
—Stephane Nappo24
Cybersecurity isn’t simply a buzzword that has gotten a lot of press lately. It also represents a multibillion-dollar issue with the FBI reporting $10.2 billion in total victim losses over the last five years.2526
Alongside problems come profits. According to Forbes, the global cybersecurity market was worth $173 billion in 2020, and it is expected to grow to $270 billion by 2026.27
Like Stephane Nappo, 2018 Global Chief Information Security Officer of the Year,28 I recognize that cybersecurity is so much more than a growing multibillion-dollar subsection of the IT industry. It can be argued how much of the discipline of cybersecurity is even directly IT-related, and as you will see as we define cybersecurity in modern terms, this field has a human element at its core.
Therefore, I believe the best cybersecurity solution is one that emphasizes the human element. We, the users of the devices, hold a lot of power over our security—far more power than we realize or care to admit.
Unlike other IT industries like software development, which mainly rely on the proper input from the human and the proper output from the machine, cybersecurity was defined and is constantly evolving because humans are curious. It’s just our nature.
Some of us use that curiosity for good, and others, not so much.
We like to tinker with things, to test their limitations. Some of us are motivated by fame, others by fortune, some by pure delight at finding out how something works.
Because of this, with the invention of the Internet and therefore a worldwide interconnected network of computers, we brought about new avenues for humans to explore their curiosity, sometimes at the expense of other humans.

Defining Cybersecurity

Before we look at the modern definition of cybersecurity, let’s take a trip back in time to recount the closest thing the cybersecurity community has to an origin story.
It was November 2, 1988. Robert Morris, a Cornell University computer science graduate student, hacked into an MIT computer and changed the way we view the Internet.29
For months, Morris had been developing a program he believed would spread slowly and secretly across the Internet. He’d written an experimental worm, a self-replicating program, just to see if it was possible. His plan was to release the worm from MIT to disguise his identity as a Cornell student.30
At around 8:30 p.m., Morris unleashed the worm, and soon after, he discovered the program was spreading far faster than he anticipated. There was a bug in his program. The computer worm was spreading at an extremely high speed and bringing computer speeds to a crawl in its path.31
“We are currently under attack,” wrote a concerned University of California, Berkeley student in an email later that night. In the span of twenty-four hours, it’s estimated that 6,000 of the 60,000 computers connected to the Internet at the time had been attacked.32
Even though the worm didn’t destroy or damage data, it managed to greatly harm productivity. Essential military and university systems were halted, and emails were delayed for days.33
Technologists worked tirelessly to figure out how the worm functioned and how it could be removed. Given the nature of the attack, exact damages were difficult to estimate, but they range anywhere from $100,000 to millions.34
Immediately following the attack, Morris contacted two of his friends in a panic. He admitted he was responsible for launching the worm, but he never intended it to get this out of control.35
He requested one of his friends to deliver an anonymous message from him across the Internet. He wanted to issue an apology and a guide on how to remove the worm. Unfortunately, because of the damage that the worm had done to the network, few people received the message in time.36
Unbeknownst to Morris, his other friend made an anonymous call to The New York Times. The friend blabbed to the reporter that he knew the person responsible for creating the program, but it was only meant to be a harmless experiment. The creator had no idea the extent of the damage that would be caused and that its spread was due to an error. It was the information gained from this call that would make the attack front-page news.37
The friend had many follow-up conversations with the reporter. During one of the conversations, the friend accidentally referred to the creator of the worm by his initials, RTM. The Times used that in...

Table of contents

  1. Introduction
  2. Part 1 What is Cybersecurity
  3. Chapter 1 Redefining Cybersecurity
  4. Chapter 2 Cybersecurity in Business
  5. Chapter 3 The Birth of Cyberspace
  6. Chapter 4 The Cyber Curiosity Mindset
  7. Part 2 What to Know About Cybersecurity
  8. Chapter 5 A New Threat Landscape
  9. Chapter 6 What is PII?
  10. Chapter 7 Malicious Intent
  11. Chapter 8 So Social
  12. Chapter 9 The Privacy Paradox
  13. Chapter 10 The New Oil
  14. Part 3 What to Do to Protect Yourself
  15. Chapter 11 The 3 Cs of Cyber Curiosity
  16. Chapter 12 Protecting Your PII
  17. Chapter 13 Protecting Vulnerable Populations
  18. Conclusion
  19. Acknowledgments
  20. Appendix