Computer Security: 20 Things Every Employee Should Know and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Start reading Computer Security on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Computer Security: 20 Things Every Employee Should Know [Paperback]

Ben Rothke
4.7 out of 5 stars  See all reviews (11 customer reviews)
Price: CDN$ 8.95 & FREE Shipping on orders over CDN$ 25. Details
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 2 to 4 weeks.
Ships from and sold by Amazon.ca. Gift-wrap available.

Formats

Amazon Price New from Used from
Kindle Edition CDN $6.34  
Paperback CDN $8.95  

Book Description

Aug. 18 2005 McGraw-Hill Professional Education
Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you'll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data.The topics covered include: Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; E-mail; Web surfing and Internet use; Instant messaging; Personal firewalls and patches; Hand-held devices; Data backup; Management of sensitive information; Social engineering tactics; and, Use of corporate resources. Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experience in the area of information systems security and privacy.

Product Details


Product Description

From the Back Cover

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

  • Phishing and spyware
  • Identity theft
  • Workplace access
  • Passwords
  • Viruses and malware
  • Remote access
  • E-mail
  • Web surfing and Internet use
  • Instant messaging
  • Personal firewalls and patches
  • Hand-held devices
  • Data backup
  • Management of sensitive information
  • Social engineering tactics
  • Use of corporate resources

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

About the Author

Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt
Search inside this book:

Customer Reviews

3 star
0
2 star
0
1 star
0
4.7 out of 5 stars
4.7 out of 5 stars
Most helpful customer reviews
By Donald Mitchell #1 HALL OF FAME TOP 50 REVIEWER
Format:Paperback
Having served as the person in our firm with the most paranoia about computer security, I have been constantly struck by how careless people can be in this area. It's as though computer security can be assumed to be in place . . . rather than being something that needs to be encouraged, nurtured and observed.

While I often read technical manuals on computer security to catch up with the latest, none of those manuals could hope to attract a full reading by anyone who has ever worked for me.

I was delighted to find that the Second Edition of Computer Security: 20 Things Every Employee Should Know has everything in it that I hope all my employees will remember to do.

The book is brief, it's accurate and it's easy to understand.

If you follow Mr. Rothke's advice, most major problems will be avoided.

The book opens by explaining about phishing and spyware by explaining what they are and why an employee should want to avoid them. Here's the advice:

1. Don't reply or click on links asking for personal or financial information.

2. Don't download programs from companies you don't know.

3. Keep your computer secure with pop-up blockers, a fire wall, and anti-virus and anti-spyware software.

I particularly liked the non-technical advice such as the one on avoiding identity theft.

The book also has little case studies of what can go wrong. One of my favorites was an employee who wanted to go home and let a new employee use his security access card so she could keep working.

Where there is a technical element, Mr. Rothke keeps that simple.
Read more ›
Was this review helpful to you?
5.0 out of 5 stars Provides baseline security reminders March 3 2004
Format:Paperback
This pamphlet sized book is a great training platform for keeping awareness up to par in your organization. It provides a baseline security reminder for 20 of the most key aspects of information security initiatives in an enterprise. This would be a useful aid in a classroom security review program or awareness training course. The points are simple and well written and apply to all users of a network environment.
Was this review helpful to you?
5.0 out of 5 stars An excellent end-user book Jan. 16 2004
Format:Paperback
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic.
It is an excellent source to reference so as to provide a security awareness training indeed. It is because we should keep something simple. Even we could sella company to purchase this book for their employees. Light-weight and simple but not simplistic handbook is useful for people to understand their positions and roles as well as relevant response and action. in security-related issues.
Was this review helpful to you?
5.0 out of 5 stars An excellent end-user book Jan. 12 2004
Format:Paperback
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic.
It is an excellent source to reference so as to provide a security awareness training indeed. It is because we should keep something simple. Even we could sella company to purchase this book for their employees. Light-weight and simple but not simplistic handbook is useful for people to understand their positions and roles as well as relevant response and action. in security-related issues.
Was this review helpful to you?
By A Customer
Format:Paperback
At 51 pages, this title is little more than a pamphlet compared with most IT security books. But here, brevity is a virtue, and I don't expect this slim volume to spend much time on the shelf.
Full of pithy, interesting quotes and bite-size chunks of information, this primer will fit perfectly into your IT security awareness campaign or into the introduction pack for every new hire.
This whistle-stop tour of information security hits all the right notes, is an easy read and is credible without resorting to fear tactics. My desk copy has already been well thumbed by those waiting for me to finish phone calls.
A large-scale security group could probably gather this same information and tailor it to their internal audience, but why bother? For smaller shops and those without much spare time, Rothke's book is a superb addition to any security awareness push.
from: [...]
Was this review helpful to you?
Format:Paperback
According to a recent InformationWeek study, 67 percent of U.S. companies say raising user awareness of computer security is a crucial priority for the next year. Thank goodness folks are finally realizing that security is everyone's business, not just the techies. But how do you train nontechnical folks on security without jargon, bewilderment, or ridiculous expense? With this little booklet, that's how.
In less than 50 pages, top security consultant Ben Rothke outlines 20 things every employee needs to know, what they should do -- and, equally important, what they shouldn't do. (Got an email about a security issue from an external source? Don't handle it on your own. Forward it to your company's security team or consultant. There are just too many hoaxes out there.)
Rothke's calm, commonsense tone will help you get folks onboard with the security tasks that really matter. Keeping passwords secure. Transferring files safely. Being secure when you're accessing the network remotely. Protecting notebooks and PDAs. Disposing of digital media without leaking information. "Social engineering" tricks to watch out for. And how to put all this stuff in context, so you don't become obsessive or paranoid.
You may need to supplement this booklet with a few of your own company's policies, but Rothke's sensitive to that. He'll take you more than 90 percent of the way. Think about buying a stack of these and passing them around. At $7.95, that's actually doable. But, hey, it's not just your employees who need this book. You do, too. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition
Was this review helpful to you?
Want to see more reviews on this item?
ARRAY(0xb8dde7b0)

Look for similar items by category


Feedback