xiii
Preface
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, rewalls and antivirus software are also not enough
to protect critical assets. This book will cover topics that range from the
processes and practices that facilitate the protection of our private informa-
tion and critical assets from attack, destruction, and unauthorized access to
the processes and practices that enable an effective response if and when
the attacks, destruction, and unauthorized access occur. This book will pro-
vide information on those topics via real situations, case law, and the latest
processes and standards from the most reliable sources. The goal is not for
you to become a fully trained security or digital forensic expert (although
I will explain how to accomplish that); rather, it is to provide accurate and
sufcient information to pique your interest and to springboard you onto
the right path if this is an area you wish to pursue. If you are not aiming to
be the next security professional at your company, this book can assist you
in understanding the importance of security in your organization because
whether you are designing software, have access to personal data, or man-
age the day-to-day activities in your ofce, you need to take a part in protect-
ing those critical assets. In any case, I am hoping the book will give you a
new appreciation for the world of cyber security and digital forensics.
There are three main goals of this book. The rst goal is to introduce the
cyber security topics every engineer should understand if he or she uses
a computer or a mobile device connected to the Internet. It is important to
understand these topics, as most engineers work for organizations that need
their data secure, and, unfortunately, not every organization invests in train-
ing its employees to understand how to reduce the risk of security incidents.
It is a well-known fact that the weakest link in any system is the user. Just ask
any hacker. The second goal is demonstrating the application of the security
concepts presented. This will be accomplished by presenting case studies
of real-world incidents. The nal goal is to provide information on certica-
tions in the areas of cyber security and digital forensics for the reader who
wants to break into this exploding eld.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.70.101