top of page

Practical Security

  • Large Corporations such Staples, Target and Home Depot have all been victims of major security breaches. Staples lost the credit information of 1.6 million customers, Home Depot had 56 million files stolen of customer information and Target had a malicious code installed on their payment processing system costing them 6.1 million dollars.  

 

  • These stories send shivers down the spines of senior management of large corporations across the globe but what is there for you? You may think: “So what? What does this epidemic of information security

       breaches have to do with me? I do not hold a high-profile position, neither do I have my own company.

       Why in the world would hackers be interested in me?

 

  • The current trends in cyber security crime suggest that for hackers, theft of personal information is a

       profitable avenue where the theft of personal credit cards makes only a tiny fraction of their profits.

       Sooner or later you will become an object of their interest and hackers will try to steal your information

       or exploit you for their benefits in one or another way. The misperception that you are safe because you

       do not have anything valuable to hackers is misleading and it is only a matter of time when you become of

       victim. 

Table of contents

Chapter 1 – Why should you care about security or how much you worth on underground market

Chapter 2 – Thread landscape: threats & vulnerabilities

Chapter 3 – Anatomy of attack and evolution of attackers

Chapter 4 – Introduction to cryptography and encryption

Chapter 5 – Malicious software. Botnets, viruses, and worms… What else is coming?

Chapter 6– Social engineering attacks: phishing, spam, trojans

Chapter 7 – Securing your computer

Chapter 8 – Securing your mobile devices

Chapter 9 – Securing your data

Chapter 10 – Passwords

Chapter 11 – Facebook, Twitter, LinkedIn: Securing your online social life

Chapter 12 – Securing your online browsing

Chapter 13 – Preserving your privacy: TOR browser

bottom of page