Book ID: CBB201310866

Cybersecurity (2021)

unapi

Duane C. Wilson (Author)


MIT Press
Publication date: 2021
Language: English


Publication Date: 2021
Physical Details: 160

It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks—attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cyber security expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use. Wilson describes the principles that underlie all cybesecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.

...More
Citation URI
data.isiscb.org/p/isis/citation/CBB201310866

This citation is part of the Isis database.

Similar Citations

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/p/isis/citation/CBB486585682/) unapi

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/p/isis/citation/CBB340774234/) unapi

Article Aynne Kokas; (2018)
Platform Patrol: China, the United States, and the Global Battle for Data Security (/p/isis/citation/CBB992297943/) unapi

Book Meg Leta Jones; (2024)
The Character of Consent: The History of Cookies and the Future of Technology Policy (/p/isis/citation/CBB023319337/) unapi

Article Roesner, Franziska; (Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering (/p/isis/citation/CBB605988846/) unapi

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/p/isis/citation/CBB326485886/) unapi

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/p/isis/citation/CBB503279988/) unapi

Article Meg Lata Jones; (April 2017)
The right to a human in the loop: Political constructions of computer automation and personhood (/p/isis/citation/CBB116228495/) unapi

Article Eugene H. Spafford; (Summer 2007)
Voter Assurance (/p/isis/citation/CBB265646858/) unapi

Book Lennon, Brian; (2018)
Passwords: philology, security, authentication (/p/isis/citation/CBB427866448/) unapi

Article O. M. Bonastre; A. Veà; (2019)
Origins of the Domain Name System (/p/isis/citation/CBB653105189/) unapi

Article Vijay Sivaraman; Hassan Habibi Gharakheili; Clinton Fernandes; Narelle Clark; Tanya Karliychuk; (June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications (/p/isis/citation/CBB353680957/) unapi

Book John Cheney-Lippold; (2017)
We are data : Algorithms and the making of our digital selves (/p/isis/citation/CBB593815757/) unapi

Book Hagengruber, Ruth; Riss, Uwe V.; (2014)
Philosophy, Computing and Information Science (/p/isis/citation/CBB001422489/) unapi

Book Jessa Lingel; (2021)
The Gentrification of the Internet: How to Reclaim Our Digital Freedom (/p/isis/citation/CBB153399179/) unapi

Book Ben Buchanan; (2022)
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics (/p/isis/citation/CBB525584724/) unapi

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/p/isis/citation/CBB570334134/) unapi

Book Mary F. E. Ebeling; (2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance (/p/isis/citation/CBB663965321/) unapi

Article Kjetil Rommetveit; Niels van Dijk; (2022)
Privacy engineering and the techno-regulatory imaginary (/p/isis/citation/CBB677677741/) unapi

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/p/isis/citation/CBB181826170/) unapi

Authors & Contributors
Durant, Darrin
Hagengruber, Ruth
Lennon, Brian
Selinger, Evan
Yost, Jeffrey R.
Riss, Uwe V.
Journals
IEEE Technology and Society Magazine
The Bridge: Journal of the National Academy of Engineering
IEEE Annals of the History of Computing
Social Studies of Science
Journal of Asian Studies
Science as Culture
Publishers
University of California Press
Belknap Press of Harvard University Press
Cornell University Press
Harvard University Press
MIT Press
New York University Press
Concepts
Computers and computing
Privacy
Computer security; cyber security
Internet
Technology and society
Data protection
Time Periods
21st century
20th century, late
20th century
Places
United States
Great Britain
China
Europe
London (England)
Middle and Near East
Institutions
Apple (firm)
Facebook (firm)
Amazon (Firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment