Computer Security: 20 Things Every Employee Should Know and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Start reading Computer Security on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Computer Security: 20 Things Every Employee Should Know [Paperback]

Ben Rothke
4.7 out of 5 stars  See all reviews (11 customer reviews)
Price: CDN$ 8.95 & FREE Shipping on orders over CDN$ 25. Details
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 2 to 5 weeks.
Ships from and sold by Amazon.ca. Gift-wrap available.

Formats

Amazon Price New from Used from
Kindle Edition CDN $5.27  
Paperback CDN $8.95  

Book Description

Sept. 8 2005 0072262826 978-0072262827 2

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

  • Phishing and spyware
  • Identity theft
  • Workplace access
  • Passwords
  • Viruses and malware
  • Remote access
  • E-mail
  • Web surfing and Internet use
  • Instant messaging
  • Personal firewalls and patches
  • Hand-held devices
  • Data backup
  • Management of sensitive information
  • Social engineering tactics
  • Use of corporate resources

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.



Product Details


Product Description

From the Back Cover

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

  • Phishing and spyware
  • Identity theft
  • Workplace access
  • Passwords
  • Viruses and malware
  • Remote access
  • E-mail
  • Web surfing and Internet use
  • Instant messaging
  • Personal firewalls and patches
  • Hand-held devices
  • Data backup
  • Management of sensitive information
  • Social engineering tactics
  • Use of corporate resources

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

About the Author

Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt
Search inside this book:

Customer Reviews

3 star
0
2 star
0
1 star
0
4.7 out of 5 stars
4.7 out of 5 stars
Most helpful customer reviews
By Donald Mitchell #1 HALL OF FAME TOP 50 REVIEWER
Format:Paperback
Having served as the person in our firm with the most paranoia about computer security, I have been constantly struck by how careless people can be in this area. It's as though computer security can be assumed to be in place . . . rather than being something that needs to be encouraged, nurtured and observed.

While I often read technical manuals on computer security to catch up with the latest, none of those manuals could hope to attract a full reading by anyone who has ever worked for me.

I was delighted to find that the Second Edition of Computer Security: 20 Things Every Employee Should Know has everything in it that I hope all my employees will remember to do.

The book is brief, it's accurate and it's easy to understand.

If you follow Mr. Rothke's advice, most major problems will be avoided.

The book opens by explaining about phishing and spyware by explaining what they are and why an employee should want to avoid them. Here's the advice:

1. Don't reply or click on links asking for personal or financial information.

2. Don't download programs from companies you don't know.

3. Keep your computer secure with pop-up blockers, a fire wall, and anti-virus and anti-spyware software.

I particularly liked the non-technical advice such as the one on avoiding identity theft.

The book also has little case studies of what can go wrong. One of my favorites was an employee who wanted to go home and let a new employee use his security access card so she could keep working.

Where there is a technical element, Mr. Rothke keeps that simple.
Read more ›
Was this review helpful to you?
Format:Paperback
According to a recent InformationWeek study, 67 percent of U.S. companies say raising user awareness of computer security is a crucial priority for the next year. Thank goodness folks are finally realizing that security is everyone's business, not just the techies. But how do you train nontechnical folks on security without jargon, bewilderment, or ridiculous expense? With this little booklet, that's how.
In less than 50 pages, top security consultant Ben Rothke outlines 20 things every employee needs to know, what they should do -- and, equally important, what they shouldn't do. (Got an email about a security issue from an external source? Don't handle it on your own. Forward it to your company's security team or consultant. There are just too many hoaxes out there.)
Rothke's calm, commonsense tone will help you get folks onboard with the security tasks that really matter. Keeping passwords secure. Transferring files safely. Being secure when you're accessing the network remotely. Protecting notebooks and PDAs. Disposing of digital media without leaking information. "Social engineering" tricks to watch out for. And how to put all this stuff in context, so you don't become obsessive or paranoid.
You may need to supplement this booklet with a few of your own company's policies, but Rothke's sensitive to that. He'll take you more than 90 percent of the way. Think about buying a stack of these and passing them around. At $7.95, that's actually doable. But, hey, it's not just your employees who need this book. You do, too. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition
Was this review helpful to you?
By Charles Ashbacher TOP 500 REVIEWER
Format:Paperback
If a company wishes to survive in the current environment where predators of all types are everywhere, then they must protect their assets. It only takes one mistake to open the protective dikes and let a person with malicious intent to gain access to important company information. Therefore, a fundamental part of company protection is educating all their employees in the basics of computer security. To do this, a short course in computer security basics is necessary, which should include behavior guidelines and threats of punishment if they are not followed.
If you are looking for a handbook to use for a short course in computer security, then this book is for you. Short and to the point without any unnecessary jargon, it can be read and understood by everyone. The twenty points presented are unquestionably those that would be in everyone's top twenty list of actions that the standard employee should perform.
Given the recent virus and terrorist threats, government mandated rules for privacy, and the exponential increase in Internet usage, computer security is rapidly becoming the most serious and dangerous issue faced by many businesses. The solution is to educate all employees in the basics of computer security, which can be done using this book as a resource.
Was this review helpful to you?
4.0 out of 5 stars Great for non-security folks Sept. 16 2003
Format:Paperback
This little brochure packs a lot of good advice for end-users and non-security managers. While those in the field of security will likely learn nothing new from the book, it will definitely enlighten less computer security savvy (which is the whole point of the book). In fact, it goes a bit beyond computer security and covers broader issues of information security. Some of the topics include dealing with malware, virus hoaxes, securing the laptop, defending against social engineering, disposing of digital media, secure remote access, etc. The book also contains concise and clear glossary of security terms.
The book is great, the only problem remaining is how to make those employees read it and actually follow the advice collected. But this is a different story altogether. I think that getting and distributing copies to just about everybody in the organization will be a good use for the book. It is well-written and easy to follow, so there is a good chance that a decent percentage of those given the copy will at least browse through it - and some of the tips will stick, potentially saving the company from major security incident loss...
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org
Was this review helpful to you?
Most recent customer reviews
5.0 out of 5 stars Provides baseline security reminders
This pamphlet sized book is a great training platform for keeping awareness up to par in your organization. Read more
Published on March 3 2004 by Brent Huston
5.0 out of 5 stars An excellent end-user book
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic. Read more
Published on Jan. 15 2004 by Anthony Lai Cheuk Tung
5.0 out of 5 stars An excellent end-user book
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic. Read more
Published on Jan. 12 2004 by Anthony LAI, CISSP
5.0 out of 5 stars Rothke's book is a superb addition to any security awareness
At 51 pages, this title is little more than a pamphlet compared with most IT security books. But here, brevity is a virtue, and I don't expect this slim volume to spend much time... Read more
Published on Dec 15 2003
5.0 out of 5 stars A *must* for Iall computer users!
How can you educate non-tech personnel on computer security? Buy them this book. It's brief and clear enough for even the most clueless end user to understand! Read more
Published on Oct. 13 2003 by Joy
4.0 out of 5 stars Straight to the point book for every end user
This is a very straight to the point book for every end user.
The book is but 20 two-page chapters, but covers nearly everything a bout security about what every end user... Read more
Published on Sept. 18 2003 by Eric Kent
5.0 out of 5 stars A Great, Accessible Manual
Initially, at the time this review is being written, Amazon.com is still misattributing the authorship of this book to a "Samuele Ghelfi. Read more
Published on Sept. 3 2003
Search Customer Reviews
Only search this product's reviews

Look for similar items by category


Feedback