- You'll save an extra 5% on Books purchased from Amazon.ca, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)
Computer Security: 20 Things Every Employee Should Know Spiral-bound – Sep 8 2005
Special Offers and Product Promotions
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Back Cover
Securing corporate resources and data in the workplace is everyone s responsibility. Corporate IT security strategies are only as good as the employee s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include: Phishing and spyware Identity theft Workplace access Passwords Viruses and malware Remote access E-mail Web surfing and Internet use Instant messaging Personal firewalls and patches Hand-held devices Data backup Management of sensitive information Social engineering tactics Use of corporate resources
Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi-ence in the area of information systems security and privacy."
About the Author
Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.
Top Customer Reviews
While I often read technical manuals on computer security to catch up with the latest, none of those manuals could hope to attract a full reading by anyone who has ever worked for me.
I was delighted to find that the Second Edition of Computer Security: 20 Things Every Employee Should Know has everything in it that I hope all my employees will remember to do.
The book is brief, it's accurate and it's easy to understand.
If you follow Mr. Rothke's advice, most major problems will be avoided.
The book opens by explaining about phishing and spyware by explaining what they are and why an employee should want to avoid them. Here's the advice:
1. Don't reply or click on links asking for personal or financial information.
2. Don't download programs from companies you don't know.
3. Keep your computer secure with pop-up blockers, a fire wall, and anti-virus and anti-spyware software.
I particularly liked the non-technical advice such as the one on avoiding identity theft.
The book also has little case studies of what can go wrong. One of my favorites was an employee who wanted to go home and let a new employee use his security access card so she could keep working.
Where there is a technical element, Mr. Rothke keeps that simple.Read more ›
In less than 50 pages, top security consultant Ben Rothke outlines 20 things every employee needs to know, what they should do -- and, equally important, what they shouldn't do. (Got an email about a security issue from an external source? Don't handle it on your own. Forward it to your company's security team or consultant. There are just too many hoaxes out there.)
Rothke's calm, commonsense tone will help you get folks onboard with the security tasks that really matter. Keeping passwords secure. Transferring files safely. Being secure when you're accessing the network remotely. Protecting notebooks and PDAs. Disposing of digital media without leaking information. "Social engineering" tricks to watch out for. And how to put all this stuff in context, so you don't become obsessive or paranoid.
You may need to supplement this booklet with a few of your own company's policies, but Rothke's sensitive to that. He'll take you more than 90 percent of the way. Think about buying a stack of these and passing them around. At $7.95, that's actually doable. But, hey, it's not just your employees who need this book. You do, too. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition
If you are looking for a handbook to use for a short course in computer security, then this book is for you. Short and to the point without any unnecessary jargon, it can be read and understood by everyone. The twenty points presented are unquestionably those that would be in everyone's top twenty list of actions that the standard employee should perform.
Given the recent virus and terrorist threats, government mandated rules for privacy, and the exponential increase in Internet usage, computer security is rapidly becoming the most serious and dangerous issue faced by many businesses. The solution is to educate all employees in the basics of computer security, which can be done using this book as a resource.
The book is great, the only problem remaining is how to make those employees read it and actually follow the advice collected. But this is a different story altogether. I think that getting and distributing copies to just about everybody in the organization will be a good use for the book. It is well-written and easy to follow, so there is a good chance that a decent percentage of those given the copy will at least browse through it - and some of the tips will stick, potentially saving the company from major security incident loss...
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org
Most recent customer reviews
This pamphlet sized book is a great training platform for keeping awareness up to par in your organization. Read morePublished on March 3 2004 by Brent Huston
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic. Read morePublished on Jan. 15 2004 by Anthony Lai Cheuk Tung
It is easy for end-user (i.e. employees) to understand some real-life security problems and the author will provide practical tips and solutions for every topic. Read morePublished on Jan. 12 2004 by Anthony LAI, CISSP
At 51 pages, this title is little more than a pamphlet compared with most IT security books. But here, brevity is a virtue, and I don't expect this slim volume to spend much time... Read morePublished on Dec 15 2003
How can you educate non-tech personnel on computer security? Buy them this book. It's brief and clear enough for even the most clueless end user to understand! Read morePublished on Oct. 13 2003 by Joy
This is a very straight to the point book for every end user.
The book is but 20 two-page chapters, but covers nearly everything a bout security about what every end user... Read more