Book Image

Cybersecurity For Dummies

By : Joseph Steinberg
Book Image

Cybersecurity For Dummies

By: Joseph Steinberg

Overview of this book

If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The book starts with an explanation of the types of threats and how they work. As you progress, you’ll learn how to locate and shore up vulnerabilities. The later chapters explain the steps for recovering from a breach if one happens. You’ll also learn about business security and techniques to keep your business safe and protected. By the end of this book, you’ll have the knowledge and skills to be prepared for a cyberattack and protect your family and business from it.
Table of Contents (14 chapters)
Free Chapter
1
Cover
11
Index
12
About the Author
13
Connect with Dummies
14
End User License Agreement

Chapter 2

Getting to Know Common Cyberattacks

IN THIS CHAPTER

check Exploring attacks that can inflict damage

check Discovering the difference between impersonation, data interception, and data theft

check Looking at the various types of malware, poisoning, and malvertising

check Understanding how cyberattackers exploit the challenges of maintaining complex technology infrastructures

check Finding out about forms of advanced cyberattacks

Many different types of cyberattacks exist — so many that I could write an entire series of books about them. In this book, however, I do not cover all types of threats in detail because the reality is, that you’re likely reading this book to learn about how to keep yourself cybersecure, not to learn about matters that have no impact on you, such as forms of attacks that are normally directed at espionage agencies, industrial equipment, or military armaments.

In this chapter, you find out about the different types of problems that cyberattackers can create...