Найдите свой следующий любимый книге

Станьте участником сегодня и читайте бесплатно в течение 30 дней
Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users

Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users

Автором Andrew J. Carey

Читать отрывок

Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users

Автором Andrew J. Carey

Длина:
101 pages
44 minutes
Издатель:
Издано:
May 18, 2020
ISBN:
9780463448748
Формат:
Книге

Описание

A short guide for less tech-savvy users and older users on how to protect your information and identity online. Written in easy-to-understand language, this book covers topics including: social engineering, storing and using strong passwords, multi-factor authentication, web browser security, and securely using social media.

Издатель:
Издано:
May 18, 2020
ISBN:
9780463448748
Формат:
Книге

Об авторе

Software developer/architect with over 20 years industry experience. In my spare time I write, watch soccer, and do dad and husband stuff in California.

Связано с Protecting Yourself Online

Похоже на «Книги»
Похожие статьи

Предварительный просмотр книги

Protecting Yourself Online - Andrew J. Carey

Copyright © 2020 by Andrew J. Carey.

All rights reserved.

Book version 1.7.2

May 2020

No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a published review.

Self-published by the author. Author can be contacted via Twitter at: @ACarey999

ISBN: 9780463448748

ASIN: B07PSGD5H1

The information presented herein represents the views and opinions of the author as of the date of publication. This book is presented for informational purposes only. Due to the rate and nature of the subject matter covered in this book, the author reserves the right to alter and update his opinions and its contents based on new conditions. While every attempt has been made to verify the information in this book, neither the author nor his affiliates/partners nor the publishers nor distributors assume any responsibility for errors, inaccuracies, or omissions.

Screenshots courtesy of Google LLC, Microsoft Corporation, and the Mozilla Corporation.

Cover image courtesy of Lisa Fotios, via Pexels.com.

About the Author

Andrew J. Carey is a software developer and a software architect. He has over 20 years experience in the software development industry, including experience and training in secure programming and information security topics. He lives in California with his family.

Table of Contents

Introduction

Social Engineering

Phishing

Phone Calls

Letters and Faxes

Reacting to Social Engineering

Post-Hack Advice

Combating Persistent Hack Attempts

Section Review

Multi-Factor Authentication

What is Multi-Factor Authentication

Multi-Factor Authentication Examples

Section Review

Passwords

Password Best Practices

Lost Password Retrieval

Section Review

Anti-Malware and Firewalls

Anti-Virus versus Anti-Malware

Choosing Anti-Malware Software

Firewalls

Section Review

Personal Computer Maintenance

How a Computer Works

Operating System Patches

Evergreen Software

Updating Older Operating Systems

Section Review

Routers and Modems

Router Overview

Modem Overview

Home Network Setup

Upgrading your Router or Modem

Finding a New Router or Modem

Router Security Tips

Section Review

Web Browser Security

Keeping your Web Browser up-to-date

Browser Sessions

Web Browser Add-ons and Extensions

Web Protocols

Digital Certificates

Extended Validation Certificates

Auto-fill Features

Section Review

Social Media

Loss of Control over Data

Privacy Settings

Shared Credentials and Privacy Concerns

Social Media Recommendations

Section Review

Miscellaneous Security Tips

Multiple Email Accounts

Online Banking Systems

Simplifying your Finances

The Internet of Things

Section Review

Other Terminology

Authentication

Bandwidth

Bloatware

Broadband

Cookie

CAPTCHA

The Cloud

Crypto-currency

The Dark Net

The Deep Web

Encryption

Hashing

ISP

Open Source

Responsiveness

Streaming

Usability

VPN

Introduction

In today’s day and age, online fraud and information theft has become an unfortunately common occurrence. This is largely due to the convenience and ubiquitous nature of the Internet, which makes communications and self-service extremely easy.

Becoming the victim of data theft and asset losses can be very traumatic. However, its worth remembering that it is not a sign of gullibility or stupidity. Even the most savvy and smart consumer can fall victim to the despicable acts of online attackers. In fact, almost everyone has fallen foul of online scammers in one way or another. Additionally, while the Internet can seem scary and dangerous, there are many good and easy ways to protect yourself and your information.

The goal of this short book is to provide guidance to you, the reader. Online consumer protection is a constantly shifting field, and some information within this book will fall out of relevance over time. But the overall goal is to relay practical time-tested steps that will

Вы достигли конца предварительного просмотра. Зарегистрируйтесь, чтобы узнать больше!
Страница 1 из 1

Обзоры

Что люди думают о Protecting Yourself Online

0
0 оценки / 0 Обзоры
Ваше мнение?
Рейтинг: 0 из 5 звезд

Отзывы читателей