Найдите свой следующий любимый книге
Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
Автором Andrew J. Carey
Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
Автором Andrew J. Carey
Описание
A short guide for less tech-savvy users and older users on how to protect your information and identity online. Written in easy-to-understand language, this book covers topics including: social engineering, storing and using strong passwords, multi-factor authentication, web browser security, and securely using social media.
Об авторе
Похожие авторы
Связано с Protecting Yourself Online
How to Hack Like a Legend: Hacking the Planet, #7 автора sparc Flow Рейтинг: 5 из 5 звезд
Связанные категории
Предварительный просмотр книги
Protecting Yourself Online - Andrew J. Carey
Copyright © 2020 by Andrew J. Carey.
All rights reserved.
Book version 1.7.2
May 2020
No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a published review.
Self-published by the author. Author can be contacted via Twitter at: @ACarey999
ISBN: 9780463448748
ASIN: B07PSGD5H1
The information presented herein represents the views and opinions of the author as of the date of publication. This book is presented for informational purposes only. Due to the rate and nature of the subject matter covered in this book, the author reserves the right to alter and update his opinions and its contents based on new conditions. While every attempt has been made to verify the information in this book, neither the author nor his affiliates/partners nor the publishers nor distributors assume any responsibility for errors, inaccuracies, or omissions.
Screenshots courtesy of Google LLC, Microsoft Corporation, and the Mozilla Corporation.
Cover image courtesy of Lisa Fotios, via Pexels.com.
About the Author
Andrew J. Carey is a software developer and a software architect. He has over 20 years experience in the software development industry, including experience and training in secure programming and information security topics. He lives in California with his family.
Table of Contents
Introduction
Social Engineering
Phishing
Phone Calls
Letters and Faxes
Reacting to Social Engineering
Post-Hack Advice
Combating Persistent Hack Attempts
Section Review
Multi-Factor Authentication
What is Multi-Factor Authentication
Multi-Factor Authentication Examples
Section Review
Passwords
Password Best Practices
Lost Password Retrieval
Section Review
Anti-Malware and Firewalls
Anti-Virus versus Anti-Malware
Choosing Anti-Malware Software
Firewalls
Section Review
Personal Computer Maintenance
How a Computer Works
Operating System Patches
Evergreen Software
Updating Older Operating Systems
Section Review
Routers and Modems
Router Overview
Modem Overview
Home Network Setup
Upgrading your Router or Modem
Finding a New Router or Modem
Router Security Tips
Section Review
Web Browser Security
Keeping your Web Browser up-to-date
Browser Sessions
Web Browser Add-ons and Extensions
Web Protocols
Digital Certificates
Extended Validation Certificates
Auto-fill Features
Section Review
Social Media
Loss of Control over Data
Privacy Settings
Shared Credentials and Privacy Concerns
Social Media Recommendations
Section Review
Miscellaneous Security Tips
Multiple Email Accounts
Online Banking Systems
Simplifying your Finances
The Internet of Things
Section Review
Other Terminology
Authentication
Bandwidth
Bloatware
Broadband
Cookie
CAPTCHA
The Cloud
Crypto-currency
The Dark Net
The Deep Web
Encryption
Hashing
ISP
Open Source
Responsiveness
Streaming
Usability
VPN
Introduction
In today’s day and age, online fraud and information theft has become an unfortunately common occurrence. This is largely due to the convenience and ubiquitous nature of the Internet, which makes communications and self-service extremely easy.
Becoming the victim of data theft and asset losses can be very traumatic. However, its worth remembering that it is not a sign of gullibility or stupidity. Even the most savvy and smart consumer can fall victim to the despicable acts of online attackers. In fact, almost everyone has fallen foul of online scammers in one way or another. Additionally, while the Internet can seem scary and dangerous, there are many good and easy ways to protect yourself and your information.
The goal of this short book is to provide guidance to you, the reader. Online consumer protection is a constantly shifting field, and some information within this book will fall out of relevance over time. But the overall goal is to relay practical time-tested steps that will