Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition) by Jason Savitt, Jason Savitt
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jason Savitt ISBN: 9781458029201
Publisher: Jason Savitt Publication: February 8, 2011
Imprint: Smashwords Edition Language: English
Author: Jason Savitt
ISBN: 9781458029201
Publisher: Jason Savitt
Publication: February 8, 2011
Imprint: Smashwords Edition
Language: English

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From the Internet's beginnings in the early 1970s, it has always been a virtual wild west for the most part. Hackers have been using it for decades to break into universities and government agencies. Then, starting in the late 1980s through the 1990s as the Internet grew in popularity, more companies started doing business on it and the hacker attacks increased dramatically.

In the mid-1990's, the World Wide Web was introduced. This brought new businesses of all sizes and millions of new users to the web every year. Soon, hackers started attacking individual home users. Most of these businesses and users were not ready for the new threats they faced at the time, so they became easy targets.

Today consumers and businesses are much better prepared than in the past. This is primarily because awareness of these threats has grown as the mainstream media started covering these issues. Also companies like Microsoft have repaired known vulnerabilities and hardened the operating systems and applications against different types of attacks.

Even with these advances, there are still several threats. There are some threats that technologies can protect us from, such as your computer's firewall which keeps out the bad network traffic and lets in the good. There are other threats that technology can't protect us from, such as revealing confidential information (e.g. your Social Security number, financial information, user account information, etc.) that shouldn't be given out.

More books from Application Software

Cover of the book Computer Vision -- ACCV 2014 by Jason Savitt
Cover of the book Microsoft Dynamics CRM 2015 Application Design by Jason Savitt
Cover of the book The Truthful Art by Jason Savitt
Cover of the book Network Security Technologies by Jason Savitt
Cover of the book Oracle Business Intelligence Discoverer 11g Handbook by Jason Savitt
Cover of the book Professional Penetration Testing by Jason Savitt
Cover of the book Referate präsentieren mit PowerPoint für Dummies Junior by Jason Savitt
Cover of the book Selected Applications of Convex Optimization by Jason Savitt
Cover of the book Compensation and Benefit Design by Jason Savitt
Cover of the book The SAS Programmer's PROC REPORT Handbook by Jason Savitt
Cover of the book Public-Key Cryptography – PKC 2019 by Jason Savitt
Cover of the book Electronic Voting by Jason Savitt
Cover of the book Mastering VMware Horizon 6 by Jason Savitt
Cover of the book Exploring Image Binarization Techniques by Jason Savitt
Cover of the book Pattern Recognition Applications and Methods by Jason Savitt
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy