Zen and the Art of Information Security

Book description

While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler’s experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.
  • Written by an internationally renowned author of Spies Among Us who travels the world making security presentations to tens of thousands of people a year
  • This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies
  • Describes the REAL security threats that you have to worry about, and more importantly, what to do about them

Table of contents

  1. Front Cover
  2. Zen and the Art of Information Security
  3. Copyright Page (1/2)
  4. Copyright Page (2/2)
  5. Contents (1/2)
  6. Contents (2/2)
  7. Introduction
  8. Why You Shouldn't Buy This Book
  9. Chapter 1. Zen and the Art of Cybersecurity (1/2)
  10. Chapter 1. Zen and the Art of Cybersecurity (2/2)
    1. Philosophy of Security
  11. Chapter 2. Why l Don't Like the Title of This Book
    1. What Makes a Scientist
    2. Why Some People are Better Scientists
    3. Putting it All Together
    4. Applying Science
  12. Chapter 3. What is Security?
    1. Risk (1/2)
    2. Risk (2/2)
    3. What is a Security Program?
    4. Optimizing Risk
    5. Consciously Accept Risk
  13. Chapter 4. A Bad Question
    1. Value has Nothing to do With Computers
    2. A Typical Security Budget
    3. Determining A Security Budget
    4. Multiyear Budgets
    5. Remind the CIO the I means Information
    6. Making Risk a Conscious Decision
  14. Chapter 5. What Makes a Master
    1. Mastering Computer Security (1/2)
    2. Mastering Computer Security (2/2)
  15. Chapter 6. Knights and Dragons
    1. The FUD Factor
    2. Dragons Forgive Incompetency
    3. Terrorists Really Aren't That Good
    4. The People You Really Have to Worry About
    5. Look for Snakes, Not Dragons
    6. Don't Suffer Death By 1,000 Cuts
  16. Chapter 7. Cyberterrorism is Not Effective
    1. Anthrax vs. Nimda
    2. It is Easier to Blow Things Up
    3. What is a Terrorist?
  17. Chapter 8. Common Sense and Common Knowledge
    1. Wanting Benefit Without the Associated Costs
    2. Some People Are Just Stupid
    3. The Wizard of Oz
  18. Chapter 9. Never Underestimate the Stupidity of a Criminal (1/2)
  19. Chapter 9. Never Underestimate the Stupidity of a Criminal (2/2)
    1. There is a Difference Between Being Good and Being Effective
    2. Understanding your Adversary (1/2)
    3. Understanding your Adversary (2/2)
    4. The Criminal Mindset
    5. Your Kids are Notas Smart as You Think
  20. Chapter 10. Information Security Is INFORMATION Security
  21. Chapter 11. Is Security a Should or a Must?
    1. Management Must Believe Security is a Must
    2. So is Security a Should or a Must For You?
  22. Chapter 12. If You Don't Remember History, You Will Repeat It (1/2)
  23. Chapter 12. If You Don't Remember History, You Will Repeat It (2/2)
  24. Chapter 13. Ira's Golden Rules
    1. Take Responsibility
    2. Decide Security is a Must
    3. Educate Yourself
    4. Remember, You are Protecting Information
    5. Protecting Your Computer
    6. Note on Security Software
    7. The 95/5 Rule
  25. Chapter 14. Chance Favors the Prepared
    1. Ubiquitous Security
    2. The Purpose of This Book
    3. Technology is Still Important
    4. Security is Really Risk Management
    5. Be Responsible
  26. Appendix A: Critical Moments in Computer Security History (1/2)
  27. Appendix A: Critical Moments in Computer Security History (2/2)
  28. Index (1/2)
  29. Index (2/2)
  30. Syngress: The Definition of a Serious Security Library (1/3)
  31. Syngress: The Definition of a Serious Security Library (2/3)
  32. Syngress: The Definition of a Serious Security Library (3/3)

Product information

  • Title: Zen and the Art of Information Security
  • Author(s): Ira Winkler
  • Release date: April 2011
  • Publisher(s): Syngress
  • ISBN: 9780080554747