Cyber Security For You

Cyber security can be very mysterious. The constant news about hacking can be very frightening. Either can leave you wondering if you will be the next victim. This article is for the majority of people who aren’t involved in cyber security for a living. It’s for those who do other things. It’s an attempt to make cyber security simple, to acquaint you with the basics, and to provide you with easy things you can do to protect your family and your business from those who would use a computer to do you harm. Though terms will be introduced, no specialized knowledge in systems and network administration or IT security is presumed.

Table of Contents

1.0 What is Cyber Security?

       1.1 The Hacker’s Objectives

       1.2 Targets

      1.3 Offensive

      1.4 Defensive

      1.5 Post Attack

2.0 Why Should I Care About Cyber Security?

       2.1 Ransomware

      2.2 Medical Records

      2.3 Human Resources (HR) Records

      2.4 Customer Records

      2.5 US Infrastructure

      2.6 General Statistics

3.0 Attacking Through Emails

      3.1 Email Scams

      3.2 Phishing

      3.3 Spear Phishing

      3.4 Spear Phishing for a Fund Transfer Scam

4.0 Attacking Though Passwords

      4.1 Dictionary Attack

      4.2 Brute Force

      4.3 Guessing

      4.4 Good and Bad Passwords

      4.5 Smart Password Usage

      4.6 Password Do’s and Don’ts

5.0 Anatomy of a Simple External Attack

      5.1 Step 1: IP Scan

      5.2 Step 2: Port Scan

      5.3 Step 3: Known Vulnerabilities

6.0 Attacking Through the Internet of Things

       6.1 Video Cameras

       6.2 Cell Phone Fingerprint Reader

       6.3 Medical Sensors

       6.4 Wearables

       6.5 Appliances

      6.6 Automobiles

      6.7 Summary

7.0 Attacking Through Social Engineering

      7.1 Face to Face

      7.2 Telephone

      7.3 Facebook

      7.4 LinkedIn

      7.5 Employees

8.0 Family Safety

      8.1 Cell Phones

      8.2 Routers & Wi-Fi

      8.3 Computers & Tablets

      8.4 Email

      8.5 Internet Access

      8.6 Appliances

      8.7 Special Risks for Children on Computers

      8.8 Social Media and You

9.0 Company Safety

      9.1 Insider Threat

      9.2 Employee Training

      9.3 Visual Hacking

      9.4 Penetration Testing

      9.5 Think Cyber Security

      9.6 NIST Cyber Security Framework

      9.7 Your Software

      9.8 Cyber Security Certifications

      9.9 Cyber Security Groups

      9.10 Thinking Outside the Box for Vulnerabilities

      9.11 Insurance

      9.12 Cyber Security Intelligence

10.0 Reducing the Liability at Your Company

      10.1 Policies and Procedures

      10.2 Best Practices / Due Diligence

      10.3 Preparing for a Breach

      10.4 Help from the US Government

      10.5 After the Breach and Breach Mitigation

      10.6 Learning from the Breach

11.0 A Look at Some Cyber Security Products

      11.1 Virus Checking

      11.2 End Point Security

      11.3 Server Security

      11.4 Application Security

      11.5 Network Security

      11.6 Code Scanners

      11.7 Application Security Testing Tools

      11.8 Ad Blockers / Anonymity Tools

12.0 Final Thoughts …