Edwards | Cyber Defense | Buch | 978-1-394-33701-9 | sack.de

Buch, Englisch, 416 Seiten

Edwards

Cyber Defense

Best Practices for Digital Safety
1. Auflage 2025
ISBN: 978-1-394-33701-9
Verlag: John Wiley & Sons Inc

Best Practices for Digital Safety

Buch, Englisch, 416 Seiten

ISBN: 978-1-394-33701-9
Verlag: John Wiley & Sons Inc


Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices
Cyber Defense is a comprehensive cyber-hygiene guide that provides an in-depth exploration of essential practices to secure one's digital life. The book begins with an introduction to cyber hygiene, emphasizing its importance and the foundational concepts necessary for maintaining digital security. It then dives into financial security, detailing methods for protecting financial accounts, monitoring transactions, and compartmentalizing accounts to minimize risks. Password management and multifactor authentication are covered, offering strategies for creating strong passwords, using password managers, and enabling multifactor authentication.
With a discussion on secure internet browsing practices, techniques to avoid phishing attacks, and safe web browsing, this book provides email security guidelines for recognizing scams and securing email accounts. Protecting personal devices is discussed, focusing on smartphones, tablets, laptops, IoT devices, and app store security issues. Home network security is explored, with advice on securing home networks, firewalls, and Wi-Fi settings. Each chapter includes recommendations for success, offering practical steps to mitigate risks.
Topics covered in Cyber Defense include: - Data protection and privacy, providing insights into encrypting information and managing personal data
- Backup and recovery strategies, including using personal cloud storage services.
- Social media safety, highlighting best practices, and the challenges of AI voice and video
- Actionable recommendations on protecting your finances from criminals
- Endpoint protection, ransomware, and malware protection strategies, alongside legal and ethical considerations, including when and how to report cyber incidents to law enforcement

Cyber Defense is an essential guide for anyone, including business owners and managers of small and medium-sized enterprises, IT staff and support teams, and students studying cybersecurity, information technology, or related fields.

Edwards Cyber Defense jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


ContentsChapter 1: Why Cyber Safety Matters Today9The Rise of Digital Connectivity10The Expanding Threat Landscape12Personal Implications of Cyber Insecurity15The Importance of Proactive Cyber Safety18Adopting Safe Online Proactices20Recommendations23Chapter Conclusion25Chapter Questions26Chapter 2: Understanding Cyber Safety in the Digital Age29Defining Cyber Safety and Security30Fundamentals of Digital Literacy33Developing Critical Thinking Skills Online35The Human Element in Cybersecurity38Recommendations42Chapter Conclusion43Chapter Questions44Chapter 3: Understanding and Preventing Identity Theft47What is Identity Theft?48Recognizing Signs of Identity Theft51Understanding Data Breaches55Preventing Identity Theft58Responding to Identity Theft and Data Breaches62Recommendations66Chapter Conclusion68Chapter Questions69Chapter 4: Protecting Your Accounts with Strong Passwords and MFA72The Importance of Strong Passwords72Creating and Managing Strong Passwords76Understanding Multi-Factor Authentication (MFA)78Advanced Account Security Measures80Protecting Business and Shared Accounts83Recommendations86Chapter Conclusion87Chapter Questions88Chapter 5: Email Security Best Practices91Understanding Email Threats92Recognizing and Avoiding Phishing Attempts95Securing Your Email Accounts99Safe Email Practices102Professional Email Etiquette and Security105Recommendations108Chapter Conclusion110Chapter Questions110Chapter 6: Managing Your Digital Footprint and Online Reputation114Understanding Your Digital Footprint115Monitoring and Controlling Your Online Presence118Building a Positive Online Reputation120Privacy Considerations123Future Implications of Your Digital Footprint125Recommendations127Chapter Conclusion129Chapter Questions130Chapter 7: Safe and Professional Use of Social Media133Navigating Social Media Platforms Securely133Protecting Personal Information136Professional Conduct on Social Media139Dealing with Social Media Threats141Leveraging Social Media Safely143Recommendations145Chapter Conclusion147Chapter Questions148Chapter 8: Dealing with Cyberbullying and Online Harassment152Understanding Cyberbullying and Harassment153Recognizing Signs of Cyberbullying155Strategies for Victims158Preventing Cyberbullying160Supporting Others and Advocacy163Recommendations166Chapter Conclusion167Chapter Questions168Chapter 9: Children's Online Safety and Parental Controls171The Digital World of Children and Teens172Communicating with Children About Cyber Safety175Implementing Parental Controls and Monitoring177Educating Children on Safe Online Practices180Collaborating with Schools and Communities183Recommendations185Chapter Conclusion187Chapter Questions188Chapter 10: Avoiding Online Scams and Social Engineering Tricks192Understanding Social Engineering193Common Online Scams195Recognizing Red Flags199Protecting Yourself from Scams202Educating Others and Staying Informed206Recommendations208Chapter Conclusion210Chapter Questions210Chapter 11: Using AI Securely and Protecting Your Privacy214The Role of AI in Everyday Life215Privacy Concerns with AI Technologies218Secure Use of AI-Powered Devices and Services221Protecting Personal Data in the Age of AI224Preparing for Future AI Developments228Recommendations230Chapter Conclusion232Chapter Questions233Chapter 12: Securing Your Devices and Wearables236Mobile Device Security Essentials237Protecting Against Mobile Malware240Securing Wearable Devices242Physical Security and Theft Prevention245Disposal and Recycling of Devices248Recommendations251Chapter Conclusion253Chapter Questions254Chapter 13: Managing Software and App Security on All Devices257Importance of Software Security258Safe Installation and Use of Applications261Configuration and Hardening of Software263Application Whitelisting and Blacklisting266Responding to Software Vulnerabilities270Recommendations272Chapter Conclusion274Chapter Questions275Chapter 14: Defending Yourself Against Ransomware and Malware278Understanding Malware and Ransomware279Preventing Malware Infections283Recognizing Signs of Infection286Responding to a Malware Attack290Mitigating the Impact of Ransomware292Recommendations295Chapter Conclusion296Chapter Questions297Chapter 15: How to Stay Safe While Browsing the Internet301Secure Browsing Practices302Avoiding Malicious Websites and Content305Protecting Personal Information Online308Mental Health and Digital Well-being312Safe Participation in Online Communities314Recommendations317Chapter Conclusion318Chapter Questions319Chapter 16: Network Security322Securing Your Home Network323Protecting Internet of Things (IoT) Devices326Safe Use of Public Wi-Fi Networks328Encryption and VPNs330Cybersecurity for Remote Work and Home Offices333Securing Online Gaming and Virtual Reality Platforms336Recommendations339Chapter Conclusion340Chapter Questions341Chapter 17: Safeguarding Your Financial Assets and Secure Online Transactions345Secure Online Banking Practices346Safe Online Shopping349Protecting Against Financial Fraud352Understanding Cryptocurrency Security356Planning for Financial Security359Recommendations361Chapter Conclusion362Chapter Questions363Chapter 18: Protecting Your Data: Backups, Cloud Storage, and Disaster Recovery367Importance of Data Protection368Effective Backup Strategies371Secure Use of Cloud Storage373Disaster Recovery Planning376Data Disposal and Destruction379Recommendations381Chapter Conclusion382Chapter Questions384Chapter 19: Cyber Crimes and How to Report Them387Understanding Cyber Crimes388Recognizing When You're a Victim391Reporting Cyber Crimes394The Investigation and Legal Process398Preventing Future Incidents400Recommendations402Chapter Conclusion404Chapter Questions405Chapter 20: Preparing for Emerging Cyber Threats408Emerging Cyber Threats409AI and Machine Learning in Cybersecurity411Adapting Security Practices415Personal Strategies for Future-Proofing Security418The Role of Individuals in Shaping Cybersecurity421Recommendations424Chapter Conclusion425Chapter Questions426Chapter 21: Teaching and Empowering Others in Cyber Safety429Sharing Knowledge and Resources430Encouraging Safe Practices in the Workplace433Supporting Friends and Family436Mentoring and Community Involvement439Continuing the Journey of Cyber Safety441Recommendations443Chapter Conclusion445Chapter Questions446Appendix – Answers to Chapter Questions449Chapter 1449Chapter 2452Chapter 3454Chapter 4456Chapter 5459Chapter 6462Chapter 7465Chapter 8468Chapter 9470Chapter 10472Chapter 11474Chapter 12476Chapter 13478Chapter 14480Chapter 15482Chapter 16484Chapter 17486Chapter 18488Chapter 19490Chapter 20492Chapter 21494Glossary496


Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and a popular voice on LinkedIn.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.