->

Cybersecurity Myths and Misconceptions Avoiding the Hazards and Pitfalls that Derail Us (Final)

English | 2022 | ISBN: 9780137929214 | 550 pages | True EPUB, MOBI | 28.57 MB


 

175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them

Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isnt the user the weakest link?

In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derails security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.

Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses.

Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them.

Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't best practices best?

Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader.

Get a high-level exposure to why statistics and figures may mislead as well as enlighten.

Develop skills to identify new myths as they emerge, strats to avoid future pitfalls, and techniques to help mitigate them.

Fall down the rabbit hole of analogies with whimsical illustrations of difficult concepts, coupled with extensive citations and humor-tinged prose that explain them.

 

Cybersecurity Myths and Misconceptions Avoiding the Hazards and Pitfalls that Derail Us (Final)

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.




rss