ABSTRACT

This chapter not only presents introductory material but also brings forth topics such as cyber ethics and explores common security myths. It aims to develop a simple threat model in which users are able to determine who and what they are protecting their information and computing resources from the value of these resources. Computers are often regarded as powerful tools that can help people manage their daily lives; for this reason, many own personal computers. Information security has become a common term used by many, often in reference to a conflict between “hackers” and security professionals, or what many see as a war of the geeks. Cyber criminals may also use the same tools as script kiddies but with the goal of profiting from stolen information. Malware can cause loss of information, alteration of information, or even loss of the use of information or a computer. The chapter also presents an overview of the key concepts discussed in this book.