Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition) by Jason Savitt, Jason Savitt
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jason Savitt ISBN: 9781458029201
Publisher: Jason Savitt Publication: February 8, 2011
Imprint: Smashwords Edition Language: English
Author: Jason Savitt
ISBN: 9781458029201
Publisher: Jason Savitt
Publication: February 8, 2011
Imprint: Smashwords Edition
Language: English

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

More books from Application Software

Cover of the book Video Surveillance Techniques and Technologies by Jason Savitt
Cover of the book Building an Intelligence-Led Security Program by Jason Savitt
Cover of the book Analysis of Large and Complex Data by Jason Savitt
Cover of the book Towards an Extra Layer of Security: Two-Factor Authentication-Part 1 of 3 by Jason Savitt
Cover of the book Essential PHP Security by Jason Savitt
Cover of the book De l'abap procédural à l'objet by Jason Savitt
Cover of the book 電腦問題:真.密技字典 by Jason Savitt
Cover of the book Blender 3D Basics: Beginner's Guide - Second Edition by Jason Savitt
Cover of the book Adobe Photoshop Unmasked by Jason Savitt
Cover of the book PeopleSoft PeopleTools Tips & Techniques by Jason Savitt
Cover of the book Splunk Essentials by Jason Savitt
Cover of the book Securing Windows: How to Protect Your Computer Properly by Jason Savitt
Cover of the book RENDITE DA AZIENDE. Come Progettare Imprese che Producono Redditi Automatici senza la tua Presenza by Jason Savitt
Cover of the book Querying over Encrypted Data in Smart Grids by Jason Savitt
Cover of the book RED by Jason Savitt
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy