Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition) by Jason Savitt, Jason Savitt
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jason Savitt ISBN: 9781458029201
Publisher: Jason Savitt Publication: February 8, 2011
Imprint: Smashwords Edition Language: English
Author: Jason Savitt
ISBN: 9781458029201
Publisher: Jason Savitt
Publication: February 8, 2011
Imprint: Smashwords Edition
Language: English

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

More books from Application Software

Cover of the book Hilfreiche Programme für Linux-Einsteiger by Jason Savitt
Cover of the book Kostenveränderung der Mobilnetznutzung für die Verbraucher (1993 - 2003) by Jason Savitt
Cover of the book Financial Cryptography and Data Security by Jason Savitt
Cover of the book UX for the Web by Jason Savitt
Cover of the book Successful Project Management by Jason Savitt
Cover of the book La méthode Prince2 - 2e éd. by Jason Savitt
Cover of the book New Challenges for Data Design by Jason Savitt
Cover of the book Mobile Game Design Essentials by Jason Savitt
Cover of the book Explorations in Art and Technology by Jason Savitt
Cover of the book CCNA Cyber Ops SECFND #210-250 Official Cert Guide by Jason Savitt
Cover of the book Kali Linux Wireless Penetration Testing Cookbook by Jason Savitt
Cover of the book Memory Design Techniques for Low Energy Embedded Systems by Jason Savitt
Cover of the book Statistics for Data Science by Jason Savitt
Cover of the book Blender - Le guide complet by Jason Savitt
Cover of the book Information Security and Cryptology -- ICISC 2013 by Jason Savitt
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy