Privacy Online: The Practical Privacy Guide For Anyone
()
About this ebook
Nowadays, everyone takes security as a serious matter: individuals, companies, institutions, organizations, and government. Everyone cares about privacy; well, I hope you too. At some point, people usually do not want information to be released for various reasons; for instance, what will happen if a naïve government employee queries a government database and messes up sending user Social Security Number to someone? Or maybe what if an attacker listens to communications between two hosts (assuming 2 diplomatic agencies)? Let’s even assume at home: you have some children browsing the web, using computers or tablets for games, streaming songs or downloading videos, all kinds of stuffs. Children like to do things online; however, they are unaware of what is out there and do not understand the risk they are taking online. So, it is your responsibility to educate and help them securing their online browsing in order to be safe. To triumph, this book comes handy to everyone who needs privacy; in other words, it makes easier for anyone to understand step by step the best practices for everyday use of Internet: beginner, medium, advanced, and addicted of Internet. Today, Internet is our home, our office, and business.
The question of security of information, privacy and confidentiality seems to be more than a personal interest. It has become a big concern for parents, administrations, institutions, corporations (public or private), agencies, etc. In a multi-user environment, we use what known as encryption to secure the communication over (probably an insecure) channel. The question: is that enough? This book explains online privacy issues and provides methods and tips to be safe from online attacks and thefts. You don’t need to be experts to understand and use this book.
Roger Fassinou
Hello I am Roger, currently living in Chicago, United States. I am an Ethical Hacker and Web Applications Penetration Tester, also a Professional Websites Developer and Senior Android Applications Developer.
Related to Privacy Online
Related ebooks
Zero Trust Proactive Cyber Security For Everyone: Protecting America Through Technology Rating: 0 out of 5 stars0 ratingsOnline Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet Rating: 4 out of 5 stars4/5Digital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data Rating: 0 out of 5 stars0 ratingsCrash Course Data Security Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsCEH v9: Certified Ethical Hacker Version 9 Practice Tests Rating: 0 out of 5 stars0 ratingsSpeaking Their Language: The Non-Techie's Guide to Managing IT & Cybersecurity for Your Organization Rating: 0 out of 5 stars0 ratingsSmart Tactics To Influence Difficult Friends With Little Motives Instantly Rating: 0 out of 5 stars0 ratingsAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsThe Network Security Test Lab: A Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsCyber-Abuse: The Target Handbook 2017 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5AI Mega Profits Unleashing Extreme Bestsellers Rating: 0 out of 5 stars0 ratingsCybersecurity as a Fishing Game: Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand Rating: 0 out of 5 stars0 ratingsFighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Rating: 0 out of 5 stars0 ratingsAI Superpowers: China, Silicon Valley, and the New World Order by Kai-Fu Lee (Discussion Prompts) Rating: 0 out of 5 stars0 ratingsAndroid Tablets For Dummies Rating: 4 out of 5 stars4/5Step Up, Step Out, And Shine: 2nd Edition Rating: 0 out of 5 stars0 ratingsMobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsCyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Rating: 0 out of 5 stars0 ratingsWhat Is....Business Identity Theft! Rating: 0 out of 5 stars0 ratingsOnline Safety: Scams, SPAM, Viruses and Clouds Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsYour Safety and Privacy Online: The CIA and NSA Rating: 0 out of 5 stars0 ratingsCyber Smarts for Students Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsFamily Net Safety Guide Rating: 0 out of 5 stars0 ratingsHow Not To Use Your Smartphone Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratings
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Privacy Online
0 ratings0 reviews
Book preview
Privacy Online - Roger Fassinou
Privacy online: the practical privacy guide for anyone
Roger Fassinou
Published by Roger fassinou at Smashwords
Copyright 2015 Roger Fassinou
Smashwords Edition, License Note
This eBook is licensed for your personal enjoyment only. This eBook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to your favorite eBook retailer and purchase your own copy. Thank you for respecting the hard work of this author.
Table of Contents
Preface
Abstract
Chapter 1-The Internet of 21st century
Section 1-The layers of security
Chapter 2-Before landing on Internet
Section 1-Select your browser
Section 2-Configure your browser
Section 3-Advanced settings (for more protection)
Chapter 3-While on Internet
Section 1-The Dos (always do that)
Section 2-The Don’t (Never do that)
Chapter 4-After exiting Internet
Chapter 5-Passwords
Section 1-Why do you need a password?
Section 2-How not to store a password?
Chapter 6-Recent successful attacks
Section 1-Social engineering attacks
Section 2-Phishing attack
Section 3-You can avoid it
Chapter 7-How to authenticate Human?
Chapter 8-How do I know my computer has been hacked?
Section 1-New programs installed
Section 2-Signs of a hacker attendance
Section 3-Password has been modified unexpected
Section 4-Network bandwidth has changed
Section 5-Have I been hacked?
Chapter 9-If you are a victim
Chapter 10-References
Thank You Note
About Roger Fassinou
Connect with Me
Preface
Dear Reader,
What I am about to reveal may be out of scope, very essential tools and methods that would save you tons of hassle and save you time and money; The main goal of this book is to raise awareness that the rules of the Internet have changed.
In writing this book, I am making three assumptions: first, I am assuming that you are a simple user of Internet; in other words, no technical or experience is required to understand the book. The primary target of this book is the high school children mostly and the parents. Second, I am assuming that not everyone knows online security tips and best practices. My third assumption is that you speak English, even if I am planning to release a translation in other languages, I do apologize for the time it will take. However, if anyone would like to contribute, I would love to discuss that option to make this book available in many other languages. If you think you can, simply reach out me by using my contact information at the end of this book.
Besides, by writing this book, I would like to be grateful to my Professor Dr. Matthew Butcher who