What Is Information Security?
How Much of Our Daily Lives Relies on Computers?
Basic Security Terminology
The Perception of Security
Security Is a Multidisciplinary Topic
Introduction to Computers and the Internet
Operation of a Computer
Overview of the Internet
Computers and the Internet
Security Role-Playing Characters
Passwords under Attack
Password Management: Let's Be Practical
Email Security and Privacy
Malware: The Dark Side of Software
What Is Malware?
How Do I Get Malware?
What Does Malware Do?
Malware: Defense in Depth
Securely Surfing the World Wide Web
Web Browser History
Spyware and Key-Loggers
Scams and Phishing Websites
Misuse and Exposure of Information
Wireless Internet Security
How Wireless Networks Work
Wireless Security Threats
Public Wi-Fi Security
Wireless Network Administration
Choose Your Friends Wisely
Malware and Phishing
Social Engineering: Phishing for Suckers
Social Engineering: Malware Distribution
Detecting a Phishing URL
Application of Knowledge
Staying Safe Online: The Human Threat
The Differences between Cyberspace and the Physical World
Consider the Context: Watch What You Say and How It Is Communicated
What You Do on the Internet Lasts Forever
Nothing Is Private, Now or in the Future
Can You Really Tell Who You Are Talking with?
Cameras and Photo Sharing
I Am a Good Person, That Would Never Happen to Me
Is There Anything I Can Do to Make the Internet a Safer Place for My Child?
Unable to Remove Malware: Help!
Securely Handling Suspicious Email Attachments
Recovering from a Phishing Attack
Email Account Hacked? Now What?
Smart Phones and Malware
Hey! You! Get off My Wireless Network
Bad Breakup? Sever Your Digital Ties
"Display Images Below"? The Meaning behind the Question
Phishing Email Forensics
It's on the Internet, So It Must Be True
Buying and Selling Online
Moving Forward with Security and Book
After the Completion of the Book
Appendix A: Reading List
Appendix B: Basics of Cryptography
Appendix C: Web Surfing Security Technologies
"... a practical, application-oriented introduction to security
education and literacy. While the information is technical enough
to provide value to information systems professionals, the
organization around specific topics makes it accessible to
non-technical users looking for information on specific issues. ...
the book would be appropriate for an upper-division introductory
course on information security ... a good book for use in
educational training programs developed by corporate information
security managers. Technical information security professionals
could also benefit from reading the book. ... the material is
well-written and effectively organized."
-W.T. Neumann, Computing Reviews, March 2013
"User error was manifest last week when it was detailed that the
New York Times was penetrated over the course of four months
by Chinese hackers who infiltrated its network and obtained
passwords for a significant amount of the Times reporters
and employees. Attempting to alleviate such user error issues,
Computer Security Literacy: Staying Safe in a Digital World
is a helpful security awareness book. ... The book provides
information about essential security topics in an easy-to-read
manner. ... a worthwhile guide for an organization to have in their
information security awareness program. It provides the reader with
an understanding and appreciation for the magnitude of computer
security. Had the New York Times employees been aware of the
risks and taken actions as written in Computer Security
Literacy, odds are that the effects would have been much less,
and they wouldn't have been a cover story in their own
-Ben Rothke, RSA Conference.com, February 2013
"... a good primer for laypersons who use computers, giving this
audience a broad understanding of important points. ...
-S.A. Patton, Indiana State University in CHOICE Magazine, June 2013