Cybersecurity
About this book
It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks—attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cyber security expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.
Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Contents
- Series Foreword
- 1 Cybersecurity Origins
- 2 Foundations
- 3 Cryptography Demystified
- 4 Cybersecurity in Layers
- 5 Who Attacked Me?
- 6 Malware in Action
- 7 Modern-Day Applications
- 8 Cybersecurity for the Future
- Glossary
- Notes
- Further Reading
- Index
