Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Digital defense : a cybersecurity primer
Pelton J., Singh I., Springer International Publishing, New York, NY, 2015. 209 pp. Type: Book (978-3-319199-52-8)
Date Reviewed: Jan 19 2017

Digital defense is a well-written, easy-to-follow, practical book, suitable for personal as well as professional use.

It makes for a worthy read as we live in a digital world and are exposed to many known and unknown risks. Our daily lives are virtually controlled by the Internet. For example, our online activities are not only limited to dealing with our personal networks through social media, but also include managing our shopping, handling our finances, ordering services, paying bills, and much more. In this book, the authors also provide the necessary data to help us make better decisions regarding selecting vacation destinations and hotels or products by reading the reviews of other customers.

With an increasing dependency on technology in our daily lives to carry out our daily transactions, we trade comfort and convenience with risks and threats that can increase stress.

This book rescues us to some extent by creating awareness about those threats, and elaborates on common cyberattacks, such as identity fraud, phishing, malware, and breach of access, as well as the larger threats that we may face in our daily modern lives at home or at work.

As the saying goes, “An ounce of prevention is worth a pound of cure.” The book provides very useful guidance on how to protect oneself while managing digital life.

The first chapter makes the reader aware of various types of cyber attacks, including the larger threats we face in our daily digital lives at home and at work, and the dangers associated with them.

Chapter 2 offers details on where to seek assistance through a number of useful services. This chapter provides a list of services for protecting one’s identity, along with details of firewall, backup memory, and insurance services if needed. It also provides guidance on protecting one’s family against cyber-bullies and other issues.

Chapter 3 focuses on who is collecting data about you. This data is collected to protect you, and to prosecute people who are performing illegal activities, such as selling goods dishonestly or misusing your details for blackmail purposes.

Chapter 4 provides ten key points to protect one from these kinds of attacks. These include upgrading systems, managing accounts, and more.

Chapter 5 emphasizes “cyber security for smartphones, mobile apps, and the ‘the cloud.’”

Chapter 6 talks about “protecting vital cyber infrastructures” such as satellite communications and remotely controlled and automated information technology (IT) systems.

“Who Will Control the Future, Black Hat Hackers or the Hacked?” is the question asked in chapter 7.

The last chapter provides ten essential rules for cyber security. Although some of them may be obvious, it is a useful checklist to ensure one’s digital world is secure.

Overall, this is a useful handbook for daily digital life.

More reviews about this item: Amazon

Reviewer:  Sandhya Jane Review #: CR145012 (1704-0228)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Public Policy Issues (K.4.1 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy