Record Detail Back
The InfoSec Handbook
This book explains information security concepts in lay terms. The target audience is beginning users. At the same time, we also describe some of the concepts in detail in order for the content to be of interest to people in the information security field. With the increasingly connected world revolving around the revolution of internet and new technologies like mobiles, smartphones, and tablets, and with the wide usage of wireless technologies, the information security risks have increased. Any information security vulnerability is possible to be widely exploited by the hackers and crackers who are looking for such opportunities. Both individuals and organizations are under regular attacks for commercial or non-commercial gains. The objectives of such attacks may be to take revenge, malign the reputation of a competitor organization, understand the strategies and sensitive information about the competitor, simply have fun of exploiting the vulnerabilities through new means and claim superiority, misuse of information like credit card details, banking account details for monetary gains, and so on. Over a period of time exploitation from the perspective of making monetary gains has increased. While objectives may vary from attack to attack, the impact can be very severe in terms of reputation loss to business loss to monetary loss to loss of sensitive information of strategic / competitive value, or loss of intellectual property rights. The hackers are constantly looking for vulnerabilities in the software applications, protocols, and infrastructure. Hence, the need to protect information assets and ensure information security receives adequate attention.
Umesh Hodeghatta Rao and Umesha Nayak - Personal Name
978-1-4302-6383-8
NONE
Information Technology
English
2014
1-376
LOADING LIST...
LOADING LIST...