Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 254 Figure 9.14 The ISP can only see the metadata of a VPN packet, not the payload. 9.3 Conclusion This chapter has outlined several principles and best practices for cybersecurity. The best practices are tied to principles in different ways. Following these principles and best practices does not guarantee perfect cybersecurity, but they will result in fewer incidents and make the user a much more difficult target for cyber attackers.

RkJQdWJsaXNoZXIy MTM4ODY=