What every engineer should know about cyber security and digital forensics / Joanna F. DeFranco.
By: DeFranco, Joanna F [author.].
Material type: BookSeries: What every engineer should kno.Publisher: Boca Raton : CRC Press, [2014]Copyright date: �201Description: 1 online resource : text file, PD.Content type: text Media type: computer Carrier type: online resourceISBN: 9781466564541 (ebook : PDF).Other title: Cyber security and digital forensics.Subject(s): Computer networks -- Security measures | Computer security | Computer crimes -- InvestigationGenre/Form: Electronic books.Additional physical formats: No titleOnline resources: Distributed by publisher. Purchase or institutional license may be required for access Also available in print formatIncludes bibliographical references and index
1. Security threats -- 2. Cyber security and digital forensics careers -- 3. Cyber security -- 4. Preparing for an incident -- 5. Incident response and digital forensics -- 6. The law -- 7. Theory to practice
"This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their engineers in understanding the risk. It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. The book also discusses cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing to demonstrate the impact of security on different engineering disciplines. In addition, the book covers the application of the concepts, presented via short case studies of real-world incidents throughout, chronologically delineating related events. It also provides information on certifications and reference manuals in the area of information security and digital forensics"-- Provided by publisher
Also available in print format
There are no comments for this item.