Compsec: For the Home User
()
About this ebook
Written in plain English and providing examples for how & why you should these practices should be followed, CompSec: For the Home User is a perfect read for anyone looking for a little extra security.
Related to Compsec
Related ebooks
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsHacking Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratingsDeep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5Hackercool Sept 2016: 0, #0 Rating: 5 out of 5 stars5/5Wifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsHack Computer System For Noobee Rating: 1 out of 5 stars1/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsZero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsHacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Understanding Network Hacks: Attack and Defense with Python Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsAn Introduction to Hacking and Crimeware: A Pocket Guide Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Hacking the Planet, #2 Rating: 5 out of 5 stars5/5
Computers For You
The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratings101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsAlan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsMaster Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Summary of Max Tegmark's Life 3.0 Rating: 0 out of 5 stars0 ratingsThe Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5
Reviews for Compsec
0 ratings0 reviews
Book preview
Compsec - Nathan Hetrick
CompSec: For The Home User
Cover design and photo by Nathan Hetrick.
Copyright © 2015 by Nathan L Hetrick. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means with the prior written permission of the publisher.
All trademarks, registered trademarks and logos are the property of their respective owners.
ISBN: 978-0-692-52308-7
Acknowledgements
I would like to thank my family and friends for their constant support in my life. This book would not have been a possibility without you.
Behold, I send you out as sheep in the midst of wolves. Therefore be wise as serpents and harmless as doves.
– Matthew 10:16 NKJV
Chapter 1
Why we should be talking about cyber-security
It’s kind of daunting writing a book on computer security when I can still remember the first time I ever saw a computer. It was an Amiga 2000. You know the one with the 8 green screen and still used 5.25
floppies. It was at a friend’s house whose father was a computer tech. He gave me my first computer programing lesson. Nothing fancy, just displaying some text on a screen then printing it out. But by the time we were through, I was hooked on the technology.
Since then the extent to which computers and the internet have become integrated into modern life is almost unfathomable. From the first webpage coming online in 1991, to the modern Internet boasting over 30 trillion websites just last year. We see that the Internet is no longer just about compiling and sharing information. It’s affecting the real world too as seen in the Internet of Everything. Where things from your fridge, to cars, to TVs, to technologies not yet imagined are all connected and coming online.
Domains from communications, commerce, critical infrastructure, and even military are dependent on the internet backbone. It wasn’t long ago that I read an article talking about how 98% of our militaries communications travel over the civilian owned and operated internet. We are dependent on it. We are in an age of cyber dependency.
We have reached a point in society where we can see the benefits of this technology, but at the same time see the risks rippling out. This can be better understood if we take a look at the numbers. According to AV-Test, a new malware signature is being discovered every half a second. 97% of Fortune 500 companies have been hacked; the other 3% probably just don’t know it yet. Over 100 countries