|
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, firewalls and antivirus software are also not enough
to protect critical assets. This book will cover topics that range from the
processes and practices that facilitate the protection of our private information
and critical assets from attack, destruction, and unauthorized access to
the processes and practices that enable an effective response if and when
the attacks, destruction, and unauthorized access occur. This book will provide
information on those topics via real situations, case law, and the latest
processes and standards from the most reliable sources. The goal is not for
you to become a fully trained security or digital forensic expert (although
I will explain how to accomplish that); rather, it is to provide accurate and
sufficient information to pique your interest and to springboard you onto
the right path if this is an area you wish to pursue. If you are not aiming to
be the next security professional at your company, this book can assist you
in understanding the importance of security in your organization because
whether you are designing software, have access to personal data, or manage
the day-to-day activities in your office, you need to take a part in protecting
those critical assets. In any case, I am hoping the book will give you a
new appreciation for the world of cyber security and digital forensics.
There are three main goals of this book. The first goal is to introduce the
cyber security topics every engineer should understand if he or she uses
a computer or a mobile device connected to the Internet. It is important to
understand these topics, as most engineers work for organizations that need
their data secure, and, unfortunately, not every organization invests in training
its employees to understand how to reduce the risk of security incidents.
It is a well-known fact that the weakest link in any system is the user. Just ask
any hacker. The second goal is demonstrating the application of the security
concepts presented. This will be accomplished by presenting case studies
of real-world incidents. The final goal is to provide information on certifications
in the areas of cyber security and digital forensics for the reader who
wants to break into this exploding field. |