Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
()
About this ebook
A short guide for less tech-savvy users and older users on how to protect your information and identity online. Written in easy-to-understand language, this book covers topics including: social engineering, storing and using strong passwords, multi-factor authentication, web browser security, and securely using social media.
Andrew J. Carey
Software developer/architect with over 20 years industry experience. In my spare time I write, watch soccer, and do dad and husband stuff in California.
Related to Protecting Yourself Online
Related ebooks
Cyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsA Best Practices Guide for Comprehensive Employee Awareness Programs Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsBeauty Plus Brain: ....showing you how to cultivate a lethal combination of a beautiful face and a beautiful brain Rating: 0 out of 5 stars0 ratingsAI And IoT A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsBlockchain Regulation A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPersons of Interest Rating: 0 out of 5 stars0 ratingsBlockchain Digital Standard Requirements Rating: 0 out of 5 stars0 ratingsCybersecurity Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsRegTech A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Security ISMS Policies And Procedures A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIbm Blockchain A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsStartups A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsI Don't Trust You: But Blockchain and Bitcoin Will Help Rating: 0 out of 5 stars0 ratingsLiving in Social Networks Manual of Responsible Use Rating: 0 out of 5 stars0 ratingsWorking the Crowd: Social media marketing for business Rating: 5 out of 5 stars5/5Customer support Second Edition Rating: 0 out of 5 stars0 ratingsInternet of Things Complete Self-Assessment Guide Rating: 1 out of 5 stars1/5Code World: Signs of the Apocalypse Rating: 0 out of 5 stars0 ratingsWeb Development Secrets: This Book Below Will Show You Exactly What What You Need To Do To Finally Be A Success With Your Website! Rating: 0 out of 5 stars0 ratingsEmail Marketing Nuts And Bolts Rating: 2 out of 5 stars2/5The Ultimate Guide To Web Traffic: Free Advertising That WORKS! Rating: 0 out of 5 stars0 ratingsArt of Talking: The Art Of Confident Communication: Mastering the Skill of Taking to Anyone. Rating: 0 out of 5 stars0 ratingsSocial Networking: Make money online Rating: 0 out of 5 stars0 ratingsFriend Me!: 600 Years of Social Networking in America Rating: 3 out of 5 stars3/5Social Media Marketing A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsYou Too Can Become a Professional Web Designer and Blogger Rating: 5 out of 5 stars5/5ChatGBT: Easily Make Money Online With ChatGBT Rating: 0 out of 5 stars0 ratingsSmart Contract Oracle Third Edition Rating: 0 out of 5 stars0 ratings
Internet & Web For You
More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5Python: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Learn HTML Programming in 7 Days: Ultimate Beginners Guide to Build and Design Your Own Website Rating: 4 out of 5 stars4/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsHow To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5Lying and Lie Detection: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsHow To Start A Podcast Rating: 4 out of 5 stars4/5C++ Learn in 24 Hours Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Protecting Yourself Online
0 ratings0 reviews
Book preview
Protecting Yourself Online - Andrew J. Carey
Copyright © 2020 by Andrew J. Carey.
All rights reserved.
Book version 1.7.2
May 2020
No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a published review.
Self-published by the author. Author can be contacted via Twitter at: @ACarey999
ISBN: 9780463448748
ASIN: B07PSGD5H1
The information presented herein represents the views and opinions of the author as of the date of publication. This book is presented for informational purposes only. Due to the rate and nature of the subject matter covered in this book, the author reserves the right to alter and update his opinions and its contents based on new conditions. While every attempt has been made to verify the information in this book, neither the author nor his affiliates/partners nor the publishers nor distributors assume any responsibility for errors, inaccuracies, or omissions.
Screenshots courtesy of Google LLC, Microsoft Corporation, and the Mozilla Corporation.
Cover image courtesy of Lisa Fotios, via Pexels.com.
About the Author
Andrew J. Carey is a software developer and a software architect. He has over 20 years experience in the software development industry, including experience and training in secure programming and information security topics. He lives in California with his family.
Table of Contents
Introduction
Social Engineering
Phishing
Phone Calls
Letters and Faxes
Reacting to Social Engineering
Post-Hack Advice
Combating Persistent Hack Attempts
Section Review
Multi-Factor Authentication
What is Multi-Factor Authentication
Multi-Factor Authentication Examples
Section Review
Passwords
Password Best Practices
Lost Password Retrieval
Section Review
Anti-Malware and Firewalls
Anti-Virus versus Anti-Malware
Choosing Anti-Malware Software
Firewalls
Section Review
Personal Computer Maintenance
How a Computer Works
Operating System Patches
Evergreen Software
Updating Older Operating Systems
Section Review
Routers and Modems
Router Overview
Modem Overview
Home Network Setup
Upgrading your Router or Modem
Finding a New Router or Modem
Router Security Tips
Section Review
Web Browser Security
Keeping your Web Browser up-to-date
Browser Sessions
Web Browser Add-ons and Extensions
Web Protocols
Digital Certificates
Extended Validation Certificates
Auto-fill Features
Section Review
Social Media
Loss of Control over Data
Privacy Settings
Shared Credentials and Privacy Concerns
Social Media Recommendations
Section Review
Miscellaneous Security Tips
Multiple Email Accounts
Online Banking Systems
Simplifying your Finances
The Internet of Things
Section Review
Other Terminology
Authentication
Bandwidth
Bloatware
Broadband
Cookie
CAPTCHA
The Cloud
Crypto-currency
The Dark Net
The Deep Web
Encryption
Hashing
ISP
Open Source
Responsiveness
Streaming
Usability
VPN
Introduction
In today’s day and age, online fraud and information theft has become an unfortunately common occurrence. This is largely due to the convenience and ubiquitous nature of the Internet, which makes communications and self-service extremely easy.
Becoming the victim of data theft and asset losses can be very traumatic. However, its worth remembering that it is not a sign of gullibility or stupidity. Even the most savvy and smart consumer can fall victim to the despicable acts of online attackers. In fact, almost everyone has fallen foul of online scammers in one way or another. Additionally, while the Internet can seem scary and dangerous, there are many good and easy ways to protect yourself and your information.
The goal of this short book is to provide guidance to you, the reader. Online consumer protection is a constantly shifting field, and some information within this book will fall out of relevance over time. But the overall goal is to relay practical time-tested steps that will