Protection of Systems

  • Campbell T
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter is the one that gets technical. If you want to be in information security, you have to accept that you will be dealing with technical systems, working closely with technical people and the majority of things you are protecting relates in some way or another to the protection of systems. Over the next few pages we are going to look at the various categories of malware in circulation today, including some detail of how these malicious programs are used by hackers to attack your systems. We’ll also look at ancillary attack modes used by criminals to ambush unsuspecting end users, such as the modern triad that has become the scourge of the Internet: spam, phishing, and ransomware. In the second half of this chapter, we’ll pivot to the aspect of system protection, looking at the defensive countermeasures you can use to secure your networks, protect your computers, and keep your applications and information safe.

Cite

CITATION STYLE

APA

Campbell, T. (2016). Protection of Systems. In Practical Information Security Management (pp. 155–177). Apress. https://doi.org/10.1007/978-1-4842-1685-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free