Introduction
Since the first edition of this book, the prevalence of online transactions has increased dramatically.
In 2004 we had e-commerce via websites; in 2016 we have smart phone apps, the Internet of Things,
as well as an expanded use of e-commerce websites. Internet traffic is far more than just humorous
YouTube videos or Facebook updates about our vacations. Now it is the heart and soul of commerce,
both domestic and international. Internet communication even plays a central role in military opera-
tions and diplomatic relations. In addition to smart phones, we now have smart watches and even
vehicles that have Wi-Fi hotspots and smart technology. Our lives are inextricably intertwined with
the online world. We file our taxes online, shop for a home online, book our next vacation online, and
even look for a date online.
Because so much of our business is transacted online, a great deal of personal information is stored
in computers. Medical records, tax records, school records, and more are all stored in computer data-
bases. This leads to some very important questions:
1. How is information safeguarded?
2. What are the vulnerabilities to these systems?
3. What steps are taken to ensure that these systems and data are safe?
4. Who can access my information?
FYI: Where Is the Internet Going?
Obviously the Internet has expanded, as previously mentioned. We now have smart phones, smart
watches, even smart cars. We have the Internet of things (IoT) which involves devices communi-
cating on the Internet. What do you think the next 10 years will bring?
Unfortunately, not only has technology and Internet access expanded since the original publication
of this book, but so have the dangers. How serious is the problem? According to a 2014 article in SC
Magazine,1 “Cyber-crime and economic espionage cost the global economy more than $445 billion
annually, which a report from the Center for Strategic and International Studies, says puts cyber-crime on par with the economic impact of global drug trafficking.”
Another study2 looked at specific companies and the cost of cybercrime in 2013. That study reported,
“We found that the average annualized cost of cyber-crime for 60 organizations in our study is $11.6
million per year, with a range of $1.3 million to $58 million. In 2012, the average annualized cost was $8.9 million. This represents an increase in cost of 26 percent or $2.6 million from the results of our cyber cost study published last year.”
The situation is not improving, either. According to a Pricewaterhouse Coopers study, in 2015 38%
more security incidents were detected than in 2014. The same study showed a 56% increase in theft of intellectual property.
In spite of daily horror stories, however, many people (including some law enforcement professionals
and trained computer professionals) lack an adequate understanding about the reality of these threats.
Clearly the media will focus attention on the most dramatic computer security breaches, not necessarily giving an accurate picture of the most plausible threat scenarios. It is not uncommon to encounter the occasional system administrator whose knowledge of computer security is inadequate.
This chapter outlines current dangers, describes the most common types of attacks on your personal
computer and network, teaches you how to speak the lingo of both hackers and security professionals,
and outlines the broad strokes of what it takes to secure your computer and your network. In this book, you will learn how to secure both individual computers and entire networks. You will
also find out how to secure data transmission, and you will complete an exercise to find out about your region’s laws regarding computer security. Perhaps the most crucial discussion in this chapter is what.

0 Comments