Abstract
This chapter tells you what to do when bad things happen. Even if you follow all the advice, you can still be a victim, either because someone else was negligent or because your system is breached despite your best efforts. Sometimes, it is just plain bad luck. However you become a victim, you can still minimize the damage and recover. Although being hacked is always an annoyance, it does not have to be a disaster.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See Brian Krebs, “How I Learned to Stop Worrying and Embrace the Security Freeze,” KrebsonSecurity, June 15, 2015. http://krebsonsecurity.com/2015/06/how-i-learned-to-stop-worrying-and-embrace-the-security-freeze/ . Accessed October 2016. Brian Krebs is a cybersecurity journalist whom hackers attack regularly in retaliation for exposing their nefarious schemes. He has experience with resisting and recovering from attack.
- 2.
File complaints at www.ic3.gov/complaint/default.aspx . Accessed October 2016.
- 3.
Artificial intelligence and machine learning are examples of progress on both sides of the law. Artificial intelligence can be used to both prevent cybercrimes and perform crimes. See John Markoff, “As Artificial Intelligence Evolves, So Does Its Criminal Potential,” New York Times, October 23, 2016. www.nytimes.com/2016/10/24/technology/artificial-intelligence-evolves-with-its-criminal-potential.html . Accessed October 2016.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Marvin Waschke
About this chapter
Cite this chapter
Waschke, M. (2017). Disaster Recovery. In: Personal Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2430-4_10
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2430-4_10
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2429-8
Online ISBN: 978-1-4842-2430-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books