Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us (Record no. 32161)

000 -LEADER
fixed length control field nam a22 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231001b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780137929238
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number SPA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Spafford, Eugene H.
245 ## - TITLE STATEMENT
Title Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Addison Wesley,
Date of publication, distribution, etc 2023
Place of publication, distribution, etc Boston :
300 ## - PHYSICAL DESCRIPTION
Extent xxxv, 380 p. ;
Other physical details ill.,
Dimensions 23 cm
365 ## - TRADE PRICE
Price amount 3709.88
Price type code INR
Unit of pricing 01
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index.
520 ## - SUMMARY, ETC.
Summary, etc 175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses. Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them. Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best? Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader. Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. "You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. ... Read the book, laugh at the right places, and put your learning to work. You won't regret it."--The Foreword by Vint Cerf, Internet Hall of Fame Pioneer Register your book for convenient access to downloads, updates, and/or corrections as they become available.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Cybersecurity Law
Topical term or geographic name as entry element Cybersecurity Misconceptions
Topical term or geographic name as entry element Antivirus software
Topical term or geographic name as entry element Base Rate Fallacy
Topical term or geographic name as entry element Cryptography
Topical term or geographic name as entry element Botnet
Topical term or geographic name as entry element Firewall
Topical term or geographic name as entry element IP address
Topical term or geographic name as entry element Magical Thinking
Topical term or geographic name as entry element Multifactor authentication
Topical term or geographic name as entry element Phishing
Topical term or geographic name as entry element Ransomware
Topical term or geographic name as entry element Vulnerability
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Metcalf, Leigh
Personal name Dykstra, Josiah
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2023-09-28 3709.88 005.8 SPA 034343 2023-10-01 Books

Powered by Koha