• Skip to main content
  • Skip to primary sidebar

Victor Font Consulting Group, LLC

The DEX Intranet Specialists

  • Home
  • Care Plans
    • Care Articles
    • Optional Subscriptions
  • Consultations
  • Products
    • Code Snippets
    • Public GitHub Repositories
    • Gist Snippets
    • Pastebin Snippets (Free)
    • Free Plugins
  • FAQs
  • Support
    • Graphic Design
  • Contact
    • Speakers
    • Portfolio
  • Resources
    • Free WordPress Video Training
    • Tutorials
    • Articles
    • Cybersecurity
    • EU Referral Network
View cart “The Ultimate Guide to the SDLC” has been added to your cart.
Cybersecurity Primer front cover

Cybersecurity Primer

$19.95

Information Technology products and services face insidious threats from advanced malware that, if left unchecked, are designed to penetrate government, corporate, and infrastructure systems to gain control over those systems, rob unsuspecting victims, steal identities, damage reputations, hold us hostage, or worse. Learn about Cybersecurity and how to protect yourself, your family, and your business.

  • Description
  • Additional information

Description

Summary

Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities.

Today, Information Technology products and services face insidious threats from advanced malware that, if left unchecked, are designed to penetrate government, corporate, and infrastructure systems to gain control over those systems, rob unsuspecting victims, steal identities, damage reputations, hold us hostage, or worse.

Ensuring the security of these products and services is of the utmost importance for the success of an organization.

This book introduces the information security principles that organizations may leverage to understand the information security needs of their respective systems.

Table of Contents

  1. Introduction
    • What’s the Difference Between Information Security and Cybersecurity?
    • Information ≠ Data
    • Target Audience
  2. The Cybersecurity Ecosystem
    • Top 10 Data Breaches of the 21st Century
    • Stuxnet
    • Cyber-MAD
    • Intrusions by Any Other Name
  3. Threats and Vulnerabilities
    • Fraud and Theft
    • Insider Threat
    • Malicious Hackers and Their Motivations
    • Non-Adversarial Threat Sources and Events
  4. The Role of Malicious Code in Cyberattacks
  5. Anatomy of a Cyberattack
    • Battle Maneuvers
  6. Cornerstones of Information Security
    • Information Security Supports the Mission of the Organization
    • Information Security Is an Integral Element of Sound Management
    • Information Security Protections Are Implemented So as To Be Commensurate with Risk
    • Information Security Roles and Responsibilities Are Explicit
    • Information Security Responsibilities for System Owners Go Beyond Their Own Organization
    • Information Security Requires A Comprehensive and Integrated Approach
    • Information Security Is Assessed and Monitored Regularly
    • Information Security Is Constrained by Societal and Cultural Factors
  7. Information Security Policy
    • Standards, Guidelines, and Procedures
    • Program Policy
    • Issue-Specific Policy
    • System-Specific Policy
    • Interdependencies
    • Cost Considerations
  8. Risk Management
  9. Assurance
  10. System Support and Operations
  11. Security Control Families
  12. Making It Personal
    • Have I Been Pwned?
    • Is Your Password A Problem?
    • The Shadowy Case of Lucas Casimir
    • Use Antivirus Software and Keep It Updated
    • OS Firewalls
    • Use a VPN
    • Use 2-Factor Authentication
    • Education and Awareness

Additional information

Weight 1 lbs
Dimensions 9.25 × 7.5 × .13250 in

You may also like…

  • Information Security Discovery Session via Skype of Zoom product image $500.00 Add to cart

Related products

  • Ultimate Guide to the SDLC front cover $74.95 Add to cart
  • Sale! Winning With WordPress Basics 2nd Edition $9.99 $0.00 Add to cart
  • Winning With WordPress Basics 2nd Edition $19.95 Add to cart
  • Ultimate Guide to the SDLC front cover $49.99 Add to cart
  • 7shares
  • Facebook1
  • Twitter2
  • Pinterest1
  • LinkedIn1
  • Print
  • SMS2

Primary Sidebar

Shopping Cart

Books

  • Winning With WordPress Basics 2nd Edition Winning With WordPress Basics 2nd Edition $19.95
  • Ultimate Guide to the SDLC front cover The Ultimate Guide to the SDLC
    Rated 5.00 out of 5
    $74.95

Recent Articles

  • Protected: WordPress Database Modernization Blueprint
  • Social Media Management
  • Site Growth Automation
  • GDPR Compliance Monitoring
  • Digital Strategy Accelerator

Top 10 Article Categories

Best Practice Code Snippet Computers and Internet Genesis How To Leadership Programming Servant Leadership Tutorial WordPress