000 02620nam a2200265Ia 4500
001 3322
008 230305s2021 xx 000 0 und d
020 _a9780262542548
040 _cTBS
041 _aeng
043 _aen_UK
100 _aWilson, Duane C.
_922263
245 0 _aCybersecurity
_c/ Duane C. Wilson
260 _aCambridge, Massachusetts :
_bThe MIT Press,
_c[2021]
300 _a147 pages : illustrations ; 18 cm.
490 _a MIT Press essential knowledge series
504 _aIncludes bibliographical references (pages 141-142) and index.
505 _aCybersecurity origins -- Foundations -- Cryptography demystified -- Cybersecurity in layers -- Who attacked me?-- Malware in action -- Modern-day applications -- Cybersecurity for the future.
520 _aAn accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics. It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks—attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cyber security expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use. Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.
650 0 _aComputer security
_92657
650 _aInternet
_x Security measures
_913732
650 _aComputer networks
_x Security measures
_913733
650 _aData protection
_913734
942 _2lcc
999 _c3156
_d3156