Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition) by Jason Savitt, Jason Savitt
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jason Savitt ISBN: 9781458029201
Publisher: Jason Savitt Publication: February 8, 2011
Imprint: Smashwords Edition Language: English
Author: Jason Savitt
ISBN: 9781458029201
Publisher: Jason Savitt
Publication: February 8, 2011
Imprint: Smashwords Edition
Language: English

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

More books from Application Software

Cover of the book Smart Grid Security by Jason Savitt
Cover of the book Advanced Analytics with R and Tableau by Jason Savitt
Cover of the book Web-Based Multimedia Advancements in Data Communications and Networking Technologies by Jason Savitt
Cover of the book The SAS Programmer's PROC REPORT Handbook by Jason Savitt
Cover of the book Leap Motion Development Essentials by Jason Savitt
Cover of the book Home Informatics and Telematics by Jason Savitt
Cover of the book Guide to Signals and Patterns in Image Processing by Jason Savitt
Cover of the book Open Brand by Jason Savitt
Cover of the book ARCHICAD passo a passo volume II by Jason Savitt
Cover of the book JavaServer Faces by Jason Savitt
Cover of the book Dropbox不用整理的檔案整理術2:別花時間搞整齊,60個自動化技巧改變辦公室與生活效率 by Jason Savitt
Cover of the book Picasa 3 100% concret by Jason Savitt
Cover of the book Artificial Intelligence and Security by Jason Savitt
Cover of the book Linux Server Security by Jason Savitt
Cover of the book Learn Business Analytics in Six Steps Using SAS and R by Jason Savitt
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy