did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781418809690

Security Awareness : Applying Practical Security in Your World

by
  • ISBN13:

    9781418809690

  • ISBN10:

    1418809691

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2006-02-07
  • Publisher: Cengage Learning Ptr
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $113.95

Summary

Building on the success of the first edition, this new text provides a non-technical approach to practical computer security for all users, from business professionals to students to home users. Suitable for any introductory security course, this book makes a great bundle for those wishing to add security coverage to their course. This practical, hands-on book includes chapter openers with real-world situations to help give meaningful context to the chapter concepts. Then, each chapter closes with hands-on projects to help students apply their knowledge through critical thinking. In addition to basic security concepts, readers will gain practical skills on how to protect and harden their computers and networks from increasingly sophisticated attacks.

Author Biography

Mark Ciampa is an Assistant Professor in Computer Information Systems at Western Kentucky University.

Table of Contents

Introduction ix
Introduction to Security
1(42)
Challenges of Securing Information
2(6)
Today's Security Attacks
2(3)
Difficulties in Defending Against Attackers
5(3)
What is Information Security?
8(8)
Defining Information Security
8(2)
Information Security Terminology
10(1)
Understanding the Importance of Information Security
11(5)
Who Are the Attackers?
16(3)
Hackers
16(1)
Crackers
17(1)
Script Kiddies
17(1)
Spies
17(1)
Thieves
17(1)
Employees
18(1)
Cyberterrorists
18(1)
Defending Against Attacks
19(2)
Layering
19(1)
Limiting
19(1)
Diversity
20(1)
Obscurity
20(1)
Simplicity
21(1)
Building a Comprehensive Security Strategy
21(2)
Block Attacks
21(1)
Update Defenses
22(1)
Minimize Losses
23(1)
Send Secure Information
23(1)
Chapter Summary
23(1)
Key Terms
24(2)
Review Questions
26(1)
Hands-On Projects
27(13)
Case Projects
40(3)
Desktop Security
43(46)
Attacks on Desktop Computers
44(9)
Malicious Software
44(3)
Basic Attacks
47(6)
Desktop Defenses
53(13)
Patch Software
53(3)
Antivirus Software
56(1)
Strong Authentication Methods
57(3)
Protecting Laptop Computers
60(1)
Cryptography
61(3)
Properly Retiring Old Computers
64(2)
Recovering from Attacks
66(4)
Preparing For an Attack
66(2)
Restoring the Computer
68(2)
Chapter Summary
70(1)
Key Terms
71(2)
Review Questions
73(1)
Hands-On Projects
74(13)
Case Projects
87(2)
Internet Security
89(40)
How the Internet Works
90(4)
The World Wide Web
90(2)
E-Mail
92(2)
Internet Attacks
94(12)
Web Attacks
95(7)
E-mail Attacks
102(4)
Web Defenses through Browser Settings
106(7)
Advanced Security Settings
106(5)
Security Zones
111(1)
Restricting Cookies
112(1)
E-Mail Defenses
113(3)
Technology-Based Defenses
113(3)
Procedures
116(1)
Chapter Summary
116(1)
Key Terms
117(2)
Review Questions
119(1)
Hands-On Projects
120(6)
Case Projects
126(3)
Personal Security
129(36)
What is Spyware?
130(4)
Spyware Tools
134(8)
Adware
134(1)
Phishing
135(3)
Keyloggers
138(2)
Configuration Changers
140(1)
Dialers
140(1)
Backdoors
141(1)
Personal Security Defenses
142(10)
Antispyware Software
142(4)
Recognize Phishing
146(3)
Legislation and Procedures
149(3)
Chapter Summary
152(1)
Key Terms
153(1)
Review Questions
154(1)
Hands-On Projects
155(7)
Case Projects
162(3)
Network Security
165(42)
How Networks Work
166(7)
Types of Networks
166(3)
Transmitting Network Data
169(1)
Network Devices
170(3)
Attacks on Networks
173(7)
Denial of Service (DoS) Attacks
173(2)
Zombie and Botnets
175(1)
Man-in-the-Middle Attacks
176(1)
Hijacking and Spoofing
176(2)
Sniffing
178(2)
Network Defenses
180(11)
Network Devices
181(5)
Network Design
186(4)
Testing Network Security
190(1)
Wireless LAN Security
191(4)
Chapter Summary
195(1)
Key Terms
196(1)
Review Questions
197(2)
Hands-On Projects
199(6)
Case Projects
205(2)
Enterprise Security
207(32)
Physical Security
208(6)
Enterprise Policies
214(4)
Security Policy
214(1)
Acceptable Use Policy (AUP)
215(2)
Privacy Policy
217(1)
Enterprise Plans
218(7)
Business Continuity Plan
218(4)
Disaster Recovery Plan
222(3)
Education and Training
225(3)
How Learners Learn
225(2)
Learning Resources
227(1)
Ethics
228(2)
Chapter Summary
230(1)
Key Terms
230(2)
Review Questions
232(2)
Hands-On Projects
234(3)
Case Projects
237(2)
Index 239

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program