Cybersecurity for the Home and Office
The Lawyer's Guide to Taking Charge of Your Own Information Security
By John Bandler, available for purchase from many online outlets
This book helps you take charge of your cybersecurity and privacy. It provides a solid understanding of cybercrime, privacy threats, information security, technology, and evolving legal and regulatory requirements.
It teaches the reader about computers and networks, and then guides the user through implementation of security and privacy measures to protect themselves, home, and family. Home is our priority, and we gain hands-on experience there.
Then this knowledge and skills can be applied to the workplace to protect the organization and improve cybersecurity measures. An overview is provided of the law and professional responsibility requirements.
Readers of any technical skill level can obtain ownership over their own cybersecurity and privacy in a methodical manner. Information security can seem overwhelming, but this book presents it with a simple framework, Bandler's Four Pillars of Cybersecurity:
- Develop knowledge and awareness
- Secure your computing devices
- Secure your data
- Secure your networks and internet usage.
This is a continual process of improvement and requires making reasoned decisions. The book also sets forth the concept of a security dial, that organizations and individuals need to select a desired level of security based upon individualized risks, and their appetite for risk. The book provides foundational knowledge on information security (including its role to protect the confidentiality, integrity, and availability of information assets), how computers and networks work, the threats of cybercrime, and more. This knowledge will foster good decision making for individuals and organizations, and the book sets forth a process to continually secure information systems.
This book is for anyone, and draws upon my experience, training, research, and study. It also had the benefit of talented editors and readers. It is published by the American Bar Association and is available through many online outlets, including the ABA, Amazon, Barnes & Noble. and more.
Technology and the internet is here to stay, along with cybercrime and other privacy threats. Each of us needs to take charge of our own technology, cybersecurity, and privacy. If you haven't started yet, you have to start somewhere, and everyone and every organization has room for improvement. This book can help you with that.
Table of Contents
1. The Need for Cybersecurity (Introduction)
2. The Black Market for Your Data: The Cybercrime Economy
3. Advertising: Another Market for Your Data
4. Basic Information Security Principles
5. Basic Computer Principals
6. Basic Networking and the Internet
7. Start Securing Yourself
8. Secure Your Devices
9. Secure Your Data
10. Secure Your Network and Internet Use
11. Secure Your Family, Children, and Seniors
12. Secure Yourself When You Travel
13. Secure the Work Office
14. The Law, and the Role and Responsibilities of Lawyers
15. Troubleshooting and Responding to Your Own Incidents
16. Conclusion
Appendices
1. Your Cybersecurity Posture and Awareness (Quiz)
2. Cybersecurity Threats and Risks You Face (Quiz)
3. Your Cybersecurity Dial
4. Cybersecurity Myths
5. How Computers Count and Why You Might Care
6. Smartphone and Tablet Decommissioning Checklist
7. Laptop and Desktop Decommissioning Checklist
8. View Data Flowing Across Your Network
9. Additional Resources and Bibliography
10. Home Device Inventory (form)
11. Personal Device and Data Summary (form)
12. Personal Data Summary (form)
13. Home Network and Internet Summary (form)
Book details
- Cybersecurity for the Home and Office, by John Bandler
- Published by the American Bar Association (ABA) in 2017
- ISBN-10: 1634259076
- ISBN-13: 978-1634259071
- LOC LCCN 2017024695, LCCN permalink https://lccn.loc.gov/2017024695
Order online
Read more on this site
- Bandler's Four Pillars of Cybersecurity
- Books
- Cybersecurity Laws and Regulations Part 1
- Introduction to Cybersecurity and Information Security
- Cybersecurity Services
Page updated 4/6/2024.