Keeping Cyber Security Simple
()
About this ebook
As technology increasingly permeates our lives, digital safety has become of vital importance. "Keeping Cyber Security Simple" offers an accessible introduction into cybersecurity aimed specifically at those new to cybersecurity practices or non-technical individuals.
This book offers a friendly yet thorough exploration of cyber threats, their real-world effects, and ways you can secure your digital life or that of your organization. Covering everything from basic online safety practices to common scams to safeguarding personal data - this guide equips readers with essential knowledge and practical steps needed for confident digital navigation.
"Keeping Cyber Security Simple" offers relatable analogies, real world examples and user-friendly explanations to simplify complex concepts for you. No prior technical expertise is needed as you embark on a learning adventure to empower informed decisions, adopt best practices, and secure yourself against cyber risks.
Tommy Lorenzo
Thomas Lorenzo, also known as Tommy, is an IT veteran of over 24 years covering Digital Transformation and Security concepts for customers. Thomas has had the privilege to work with various global companies such as Telefonica, Microsoft, Trend Micro, and Dell Technologies. During this time, he has helped customers with Incident Response, Generating new Security Postures, and Educating non-technical audiences on the importance of adopting Cyber Security as a Business Practice. When he is not working with Customers, Tommy spends most of his time reading, watching sports, and traveling the world. An admitted Star Wars fanatic, he spends many hours re-watching the movie series and reading Star Wars novels or, says his wife of 9 years! A good coffee cup is never too far away from his desk. Tommy currently lives near Fort Lauderdale, FL, with his wife. Keep in touch with Tommy via the web: Twitter: http://www.twitter.com/tlorenzo_pr (now known as X) Instagram: https://instagram.com/tommylorenzoauthor
Related to Keeping Cyber Security Simple
Related ebooks
Cyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsThe Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5Hack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Accountants and CPAs Rating: 0 out of 5 stars0 ratingsPrivileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsSecrets and Lies: Digital Security in a Networked World Rating: 4 out of 5 stars4/5Cyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Corporate Directors and Board Members Rating: 1 out of 5 stars1/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsCybersecurity For Beginners: Learn How To Defend Against Online Threats Rating: 0 out of 5 stars0 ratingsSecuring Social Media in the Enterprise Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Ultimate Ethical Hacking Boot Camp Beginner to Pro Rating: 0 out of 5 stars0 ratingsConquer the Web: The Ultimate Cybersecurity Guide Rating: 0 out of 5 stars0 ratingsOnline Safety: Scams, SPAM, Viruses and Clouds Rating: 0 out of 5 stars0 ratingsCybersecurity for the Modern Adult: Protecting Yourself Online Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 5 out of 5 stars5/5Comprehensive Guide to Personal Cybersecurity: Personal Cybersecurity Practices for a Safer Digital Life Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Codes and Ciphers Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5
Reviews for Keeping Cyber Security Simple
0 ratings0 reviews
Book preview
Keeping Cyber Security Simple - Tommy Lorenzo
Acknowledgment
Iwant to thank those who inspired and helped me during this journey, giving me the confidence to achieve my dream of being an author. My daughter Gabriela Nichole gave credence to this dream and helped me review every word while challenging me to make the book easier to understand
for those interested in security but not technically versed. My brother Eduardo, who painfully read the book's first few drafts, offered me the perspective on how to let my voice speak in every chapter.
I also have to acknowledge the support of my wife Shanell, who would follow up with me every week on how the progress went; Estephanie Aguilar, Edwin Rivera, and Jean Hernandez each provided their two cents
on topics our customers ask us every week, and being brutally honest with their assertations on how not to make it boring.
To all my coworkers and customers who challenge me every day to be better and learn new ways to evangelize the message of security, I thank you all.
I enjoyed this process and hope it helps you learn or clarify that security is not an easy topic, but we have ways to simplify it and make it practical in our daily lives.
Introduction
It’s 2009, you’re in Los Angeles, and Kobe Bryant’s LA Lakers just won the NBA finals, and everyone is in a frenzy. With most people celebrating, it’s a perfect time to move on to your mission. You feel comfortable looking well-dressed, handsome, and athletic with a million-dollar smile. The mission is to infiltrate a heavily guarded building to obtain highly classified information. The team has been evaluating and planning how to access and move about the building for months. Gaining access requires an ID, and you identify the janitor as the easiest target; like in most movies, she has the keys that provide access to the whole building with one credential. You can quickly take the identity from her with your charm and wit.
A distraction is needed to move freely to the top floor because most people in the building don’t know you. As in all spy movies, your backup team keeps an eye as you move around the building, and they manage to cut all video cameras that monitor the building and trigger the alarm to have everyone evacuate the premises. Once you reach the top floor, you pull out your camera to take pictures of classified documents or break into the safe to take the crown jewels you came for. You can sell everything to the best bidder or request a ransom with everything secured.
At this point, you may ask yourself, What in the name of... does this have to do with cyber security?
In today’s modern society, the ‘heavily guarded building’ could be your home, office, or anywhere your data lives. The spy is the hacker, and the ‘backup team’ is the group cooperation they use to infiltrate your systems (most hackers share scripts, tools, and methods). Hackers are brilliant and patient people taking their time evaluating your defenses and creating distractions (they trigger mini-attacks to see how your security will try to defend). They can steal your identity or access accounts to your network (like they did to the janitor) to gain access to your bank accounts, ask for loans, use your credit, or sell it on the dark web to the highest bidder. Hackers use various techniques and tactics, such as social engineering, to obtain valuable information from your circle of friends, social media, or just overhearing a conversation at a local coffee shop. The ‘classified documents’ can be information on your clients, blueprints to that new product you have been working on, private information like photos, social security numbers, and bank statements... I can go on, but I think you get the picture. As a side note, I have no idea if the hackers are tall, handsome, or athletic; for all I know, they might be tiny little people living under your house, but I love James Bond movies and thought the analogy would be spot on.
Questions I hear from most of my customers include why did this happen? Why didn’t our team notice this happening? Is the impact real, or is this just security companies creating fear to sell more products and services? How can we prevent this from happening to us?
These are all valid questions; I probably forgot a few more that we could discuss in more detail as we go along in the following few chapters. We’ll do our best to cover them along the way.
While reading this ebook, we’ll discuss why this is important for all of us and the impact on you or your organization. It might get bumpy with a few terms; however, I’ll include a glossary for reference, and we’ll do our best to provide enough real-life examples of actions, processes, tools, and possible effects.
Before the security community jumps all over me, I want to clarify that this book intends to Simplify a very complex topic to educate the general public and decision-makers. I purposely omitted many technical details like DDOS attacks, NAT, scripting tools, vectors of attack, and a few others as these are very technical and require a more profound understanding of technical terms. Let us Keep Cyber Security Simple!
Chapter 1: What is Cybersecurity & Why Should You Care
Cybersecurity safeguards computer systems, networks, and digital assets from theft, damage, or unauthorized access through technology policies and processes designed to secure sensitive