Book ID: CBB201310866

Cybersecurity (2021)

unapi

Duane C. Wilson (Author)


MIT Press


Publication Date: 2021
Physical Details: 160
Language: English

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks—attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cyber security expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use. Wilson describes the principles that underlie all cybesecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB201310866/

Similar Citations

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB486585682/)

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/isis/citation/CBB340774234/)

Article Aynne Kokas; (2018)
Platform Patrol: China, the United States, and the Global Battle for Data Security (/isis/citation/CBB992297943/)

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/isis/citation/CBB326485886/)

Article Roesner, Franziska; (Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering (/isis/citation/CBB605988846/)

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/isis/citation/CBB503279988/)

Article Eugene H. Spafford; (Summer 2007)
Voter Assurance (/isis/citation/CBB265646858/)

Article O. M. Bonastre; A. Veà; (2019)
Origins of the Domain Name System (/isis/citation/CBB653105189/)

Article Meg Lata Jones; (April 2017)
The right to a human in the loop: Political constructions of computer automation and personhood (/isis/citation/CBB116228495/)

Book John Cheney-Lippold; (2017)
We are data : Algorithms and the making of our digital selves (/isis/citation/CBB593815757/)

Article Vijay Sivaraman; Hassan Habibi Gharakheili; Clinton Fernandes; Narelle Clark; Tanya Karliychuk; (June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications (/isis/citation/CBB353680957/)

Book Jessa Lingel; (2021)
The Gentrification of the Internet: How to Reclaim Our Digital Freedom (/isis/citation/CBB153399179/)

Book Hagengruber, Ruth; Riss, Uwe V.; (2014)
Philosophy, Computing and Information Science (/isis/citation/CBB001422489/)

Book Lennon, Brian; (2018)
Passwords: philology, security, authentication (/isis/citation/CBB427866448/)

Book Mary F. E. Ebeling; (2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance (/isis/citation/CBB663965321/)

Article Kjetil Rommetveit; Niels van Dijk; (2022)
Privacy engineering and the techno-regulatory imaginary (/isis/citation/CBB677677741/)

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/isis/citation/CBB775086796/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB758382142/)

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/isis/citation/CBB485378597/)

Authors & Contributors
Stewart, Andrew J.
Ashley Sweetman
Niels Van Dijk
Hassan Habibi Gharakheili
Jones, Meg Lata
Ebeling, Mary F. E.
Concepts
Privacy
Computers and computing
Computer security; cyber security
Technology and society
Internet
Security technologies
Time Periods
21st century
20th century, late
20th century
Modern
Places
United States
Middle and Near East
London (England)
Europe
China
Great Britain
Institutions
Facebook (firm)
Apple (firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment