Chapter 6
Chapter 6 of the book discusses physical and logical security. The chapter starts off by describing the different kinds of threats to computers and network data. It talks about how users can use encryption to protect and secure their information. This chapter also has an example of a phishing email and provides a resource to learn more about phishing attacks and identity theft so you can better protect your personal information. The development of authentication methods, SSL and TSL have provided users with a sense of security while online. There is still the threat of malware, worms and spyware but with diligence you can protect yourself from these attacks. I thought this chapter was an interesting read and has some useful resources.
