|
Showing 1 - 6 of
6 matches in All Departments
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues
affecting SCADA systems and overall critical infrastructure
protection. The respective co-authors are among the leading experts
in the world capable of addressing these related-but-independent
concerns of SCADA security. Headline-making threats and
countermeasures like malware, sidejacking, biometric applications,
emergency communications, security awareness llanning, personnel
& workplace preparedness and bomb threat planning will be
addressed in detail in this one of a kind book-of-books dealing
with the threats to critical infrastructure protection. They
collectivly have over a century of expertise in their respective
fields of infrastructure protection. Included among the
contributing authors are Paul Henry, VP of Technology Evangelism,
Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone
Technologies, Phil Drake, Telecommunications Director, The
Charlotte Observer, Patrice Bourgeois, Tenable Network Security,
Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb
Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of
the complexities of SCADA security and its impact on critical
infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA
and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat
planning, emergency communications, employee safety and much
more
* Companion Website featuring video interviews with subject matter
experts offer a "sit-down" with the leaders in the field
A thorough update to a classic in the field of privacy and big
data. We have a global privacy problem. The average person provides
more information about themselves to more outsiders than any time
in history. Corporations, governments and even our neighbors can
know where we are at times, can quickly learn our preferences and
priorities and see who we meet. The past decade has brought deep
changes in the collection of our private information, the
regulation of that collection, and in people's sensitivity to loss
of privacy. The nascent privacy-threatening technology trends of a
decade ago have blossomed into relentless data-capturing systems
that police and companies have come to rely on. To address the
expansion of personal data capture, entire data regulatory regimes
have arisen throughout the world, with new regulations added each
year. People are more concerned, regulators are more aggressive,
yet data collection continues to increase with consequences around
the world. Social media use has fragmented in the past five years,
spreading personal information over dozens of platforms. Even most
of our new televisions have started collecting second-by-second
information about our households recently, and some of those
televisions can recognize the individuals watching and the devices
they carry. Amazon just activated a new worldwide network using
bandwidth from personal wifi of Echo devices and Ring security
systems. The beat of new intrusions never seems to end. These data
trends are relentless, and yet response to the pandemic accelerated
them. Rapid development of "contactless everything" became the
norm. Contact tracing apps became acceptable. QR codes for
everything from menus to contact information were created quickly.
Businesses are faced with hybrid in office and remote workforces.
More people are dependent on online and mobile technologies for
food, medicine, and even human connection. And each of these
contacts can be captured somewhere and logged in a file for
marketing or surveillance. People want to keep their lives private,
but they don't know how. The second edition of Privacy in the Age
of Big Data addresses the significant advances in data-driven
technology, their intrusion deeper in our lives, the limits on data
collection newly required by governments in North America and
Europe, and the new security challenges of world rife with
ransomware and hacking. This thoroughly updated edition
demonstrates personal privacy vulnerabilities and shows ways to
live a safer, more private life. Other privacy books tend to focus
deeply on the evils of large tech companies or more academic and
technical concerns. But Privacy in the Age of Big Data, second
edition, helps regular people understand the privacy threats and
vulnerabilities in their daily lives and will provide solutions for
maintaining better privacy while enjoying a modern life. Unlike
other books, this one shows what you can do to make a difference to
understand your current digital footprint and what you need to do
to claw back your privacy and secure it in the future. While
PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to
many demographics, working adults 25-60 and CEOs and Boards of
businesses are the primary demographic--young enough to know we
need to do something to protect privacy and old enough to remember
what happens when we haven't in the past. With down-to-earth prose
and examples pulled from daily life, the writing style will attract
buyers of all education levels.
People research everything online - shopping, school, jobs, travel
- and other people. Your online persona is your new front door. It
is likely the first thing that new friends and colleagues learn
about you. In the years since this book was first published, the
Internet profile and reputation have grown more important in the
vital human activities of work, school and relationships. This
updated edition explores the various ways that people may use your
Internet identity, including the ways bad guys can bully, stalk or
steal from you aided by the information they find about you online.
The authors look into the Edward Snowden revelations and the
government's voracious appetite for personal data. A new chapter on
the right to be forgotten explores the origins and current effects
of this new legal concept, and shows how the new right could affect
us all. Timely information helping to protect your children on the
Internet and guarding your business's online reputation has also
been added. The state of Internet anonymity has been exposed to
scrutiny lately, and the authors explore how anonymous you can
really choose to be when conducting activity on the web. The growth
of social networks is also addressed as a way to project your best
image and to protect yourself from embarrassing statements.
Building on the first book, this new edition has everything you
need to know to protect yourself, your family, and your reputation
online.
Digital data collection and surveillance gets more pervasive and
invasive by the day; but the best ways to protect yourself and your
data are all steps you can take yourself. The devices we use to get
just-in-time coupons, directions when we're lost, and maintain
connections with loved ones no matter how far away they are, also
invade our privacy in ways we might not even be aware of. Our
devices send and collect data about us whenever we use them, but
that data is not safeguarded the way we assume it would be. Privacy
is complex and personal. Many of us do not know the full extent to
which data is collected, stored, aggregated, and used. As recent
revelations indicate, we are subject to a level of data collection
and surveillance never before imaginable. While some of these
methods may, in fact, protect us and provide us with information
and services we deem to be helpful and desired, others can turn out
to be insidious and over-arching. Privacy in the Age of Big Data
highlights the many positive outcomes of digital surveillance and
data collection while also outlining those forms of data collection
to which we may not consent, and of which we are likely unaware.
Payton and Claypoole skillfully introduce readers to the many ways
we are 'watched,' and how to adjust our behaviors and activities to
recapture our privacy. The authors suggest the tools, behavior
changes, and political actions we can take to regain data and
identity security. Anyone who uses digital devices will want to
read this book for its clear and no-nonsense approach to the world
of big data and what it means for all of us.
|
|