Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Cybersecurity for everyone / David B. Skillicorn.
Author
Skillicorn, David B.
[Browse]
Format
Book
Language
English
Εdition
1st ed.
Published/Created
Boca Raton : CRC Press, 2021.
©2021
Description
1 online resource (viii, 94 pages).
Availability
Available Online
SCI-TECHnetBASE
Taylor & Francis eBooks Complete
Details
Subject(s)
Computer security
[Browse]
Series
CRC focus series.
[More in this series]
CRC focus
Summary note
Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
Notes
Includes index.
Source of description
Description based on print version record.
Contents
Cover
Half Title
Title Page
Copyright Page
Contents
Preface
1. Introduction
2. How cyberspace works
2.1. Encounters with cyberspace
2.2. What is cyberspace?
2.3. Nodes
2.4. People
2.5. Pipes
2.6. Configuration
2.7. Types of traffic
2.8. The Deep Web
2.9. The Dark Web
2.10. The World Wide Web
2.11. Social aspects
2.12. Governance
2.13. Security issues
2.14. Non-benign use of cyberspace
3. Encryption and hashing
3.1. Private key encryption
3.2. Public key encryption
3.3. Digital signing and digital hashing
3.4. Encryption in use
4. Node security
4.1. Getting access to nodes
4.2. Malware
4.3. What does malware do?
4.4. Direct attacks
5. Pipe security
5.1. IP
5.2. TCP
5.3. UDP
5.4. Attacks leveraging protocols
5.5. Countermeasures
6. Configuration security
6.1. Internet Control Message Protocol
6.2. Domain Name Service
6.3. Switch vulnerabilities
6.4. Mounting an attack
6.5. Defending against attacks
6.6. Recovery
7. Application security
7.1. Email
7.2. Web traffic
7.3. Blockchains
8. Summary
Index
Show 48 more Contents items
ISBN
1-00-312403-8
1-003-12403-8
1-000-29861-2
1-000-29867-1
OCLC
1224862228
Doi
10.1201/9781003124030
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information