Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition) by Jason Savitt, Jason Savitt
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jason Savitt ISBN: 9781458029201
Publisher: Jason Savitt Publication: February 8, 2011
Imprint: Smashwords Edition Language: English
Author: Jason Savitt
ISBN: 9781458029201
Publisher: Jason Savitt
Publication: February 8, 2011
Imprint: Smashwords Edition
Language: English

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

More books from Application Software

Cover of the book Mastering Autodesk Revit 2018 by Jason Savitt
Cover of the book Java Made Simple by Jason Savitt
Cover of the book Network Security A Beginner's Guide, Third Edition by Jason Savitt
Cover of the book SQL Server on Linux by Jason Savitt
Cover of the book Photoshop CC by Jason Savitt
Cover of the book DynamoDB Cookbook by Jason Savitt
Cover of the book Practical Data Analysis with JMP, Second Edition by Jason Savitt
Cover of the book Mail for Beginners by Jason Savitt
Cover of the book Levels and Curves with GIMP by Jason Savitt
Cover of the book 嗯!Office 2013我也會-超實用的活動DMX財會營收X銷售分析X互動影音X雲端協同範例即上手 by Jason Savitt
Cover of the book PowerPoint 2016 by Jason Savitt
Cover of the book Automated Security Management by Jason Savitt
Cover of the book Ransomware by Jason Savitt
Cover of the book Dr. Tom Shinder's Configuring ISA Server 2004 by Jason Savitt
Cover of the book CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501) by Jason Savitt
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy