Computer Security: 20 Things Every Employee Should Know and over one million other books are available for Amazon Kindle. Learn more
CDN$ 8.95
FREE Shipping on orders over CDN$ 25.
Usually ships within 3 to 5 weeks.
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Computer Security: 20 Things Every Employee Should Know Paperback – Sep 8 2005


See all 3 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 8.95
CDN$ 8.95 CDN$ 2.45

Best Canadian Books of 2014
Margaret Atwood's stunning new collection of stories, Stone Mattress, is our #1 Canadian pick for 2014. See all

Special Offers and Product Promotions

  • Join Amazon Student in Canada


Customers Who Bought This Item Also Bought



Product Details

  • Paperback: 45 pages
  • Publisher: McGraw-Hill Osborne Media; 2 edition (Sept. 8 2005)
  • Language: English
  • ISBN-10: 0072262826
  • ISBN-13: 978-0072262827
  • Product Dimensions: 15.2 x 1.3 x 22.9 cm
  • Shipping Weight: 113 g
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Bestsellers Rank: #1,591,002 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:

  • Phishing and spyware
  • Identity theft
  • Workplace access
  • Passwords
  • Viruses and malware
  • Remote access
  • E-mail
  • Web surfing and Internet use
  • Instant messaging
  • Personal firewalls and patches
  • Hand-held devices
  • Data backup
  • Management of sensitive information
  • Social engineering tactics
  • Use of corporate resources

Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.

About the Author

Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt
Search inside this book:

Customer Reviews

4.7 out of 5 stars
5 star
8
4 star
3
3 star
0
2 star
0
1 star
0
See all 11 customer reviews
Share your thoughts with other customers

Most helpful customer reviews

Format: Paperback
Having served as the person in our firm with the most paranoia about computer security, I have been constantly struck by how careless people can be in this area. It's as though computer security can be assumed to be in place . . . rather than being something that needs to be encouraged, nurtured and observed.

While I often read technical manuals on computer security to catch up with the latest, none of those manuals could hope to attract a full reading by anyone who has ever worked for me.

I was delighted to find that the Second Edition of Computer Security: 20 Things Every Employee Should Know has everything in it that I hope all my employees will remember to do.

The book is brief, it's accurate and it's easy to understand.

If you follow Mr. Rothke's advice, most major problems will be avoided.

The book opens by explaining about phishing and spyware by explaining what they are and why an employee should want to avoid them. Here's the advice:

1. Don't reply or click on links asking for personal or financial information.

2. Don't download programs from companies you don't know.

3. Keep your computer secure with pop-up blockers, a fire wall, and anti-virus and anti-spyware software.

I particularly liked the non-technical advice such as the one on avoiding identity theft.

The book also has little case studies of what can go wrong. One of my favorites was an employee who wanted to go home and let a new employee use his security access card so she could keep working.

Where there is a technical element, Mr. Rothke keeps that simple.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
According to a recent InformationWeek study, 67 percent of U.S. companies say raising user awareness of computer security is a crucial priority for the next year. Thank goodness folks are finally realizing that security is everyone's business, not just the techies. But how do you train nontechnical folks on security without jargon, bewilderment, or ridiculous expense? With this little booklet, that's how.
In less than 50 pages, top security consultant Ben Rothke outlines 20 things every employee needs to know, what they should do -- and, equally important, what they shouldn't do. (Got an email about a security issue from an external source? Don't handle it on your own. Forward it to your company's security team or consultant. There are just too many hoaxes out there.)
Rothke's calm, commonsense tone will help you get folks onboard with the security tasks that really matter. Keeping passwords secure. Transferring files safely. Being secure when you're accessing the network remotely. Protecting notebooks and PDAs. Disposing of digital media without leaking information. "Social engineering" tricks to watch out for. And how to put all this stuff in context, so you don't become obsessive or paranoid.
You may need to supplement this booklet with a few of your own company's policies, but Rothke's sensitive to that. He'll take you more than 90 percent of the way. Think about buying a stack of these and passing them around. At $7.95, that's actually doable. But, hey, it's not just your employees who need this book. You do, too. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
If a company wishes to survive in the current environment where predators of all types are everywhere, then they must protect their assets. It only takes one mistake to open the protective dikes and let a person with malicious intent to gain access to important company information. Therefore, a fundamental part of company protection is educating all their employees in the basics of computer security. To do this, a short course in computer security basics is necessary, which should include behavior guidelines and threats of punishment if they are not followed.
If you are looking for a handbook to use for a short course in computer security, then this book is for you. Short and to the point without any unnecessary jargon, it can be read and understood by everyone. The twenty points presented are unquestionably those that would be in everyone's top twenty list of actions that the standard employee should perform.
Given the recent virus and terrorist threats, government mandated rules for privacy, and the exponential increase in Internet usage, computer security is rapidly becoming the most serious and dangerous issue faced by many businesses. The solution is to educate all employees in the basics of computer security, which can be done using this book as a resource.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
This little brochure packs a lot of good advice for end-users and non-security managers. While those in the field of security will likely learn nothing new from the book, it will definitely enlighten less computer security savvy (which is the whole point of the book). In fact, it goes a bit beyond computer security and covers broader issues of information security. Some of the topics include dealing with malware, virus hoaxes, securing the laptop, defending against social engineering, disposing of digital media, secure remote access, etc. The book also contains concise and clear glossary of security terms.
The book is great, the only problem remaining is how to make those employees read it and actually follow the advice collected. But this is a different story altogether. I think that getting and distributing copies to just about everybody in the organization will be a good use for the book. It is well-written and easy to follow, so there is a good chance that a decent percentage of those given the copy will at least browse through it - and some of the tips will stick, potentially saving the company from major security incident loss...
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most recent customer reviews



Feedback