Basics of Cyber Safety

Computer and Mobile Device Safety Made Easy
 
 
Syngress (Verlag)
  • 1. Auflage
  • |
  • erschienen am 20. August 2016
  • |
  • 254 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
978-0-12-416639-4 (ISBN)
 

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history.

This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.


  • Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use
  • Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe


John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in Huntington, West Virginia. John teaches digital forensics, electronic discovery, information security and technology in the School of Forensic and Criminal Justices Sciences. He's also adjunct faculty with the Marshall University graduate forensic science program where he teaches the advanced digital forensics course. John, a former police officer, is also an Investigator with the Cabell County Prosecuting Attorney's Office and a member of the West Virginia Internet Crimes Against Children Task Force. He is a Member of the American Academy of Forensic Sciences, the High Technology Crime Investigation Association, and Infragard.
John is the founder and President of the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement and information security practitioners in the private sector. He is the author of best-selling book, The Basics of Digital Forensics published by Syngress.
  • Englisch
  • Rockland, MA
  • |
  • USA
Elsevier Science
  • 4,82 MB
978-0-12-416639-4 (9780124166394)
0124166393 (0124166393)
weitere Ausgaben werden ermittelt
  • Front Cover
  • The Basics of Cyber Safety
  • Copyright Page
  • Dedication
  • Contents
  • About the Authors
  • Acknowledgments
  • 1 What is cyber safety?
  • What Is Cyber Safety?
  • Why Is It Important?
  • What Is the Internet?
  • Keep the Faith
  • Paying Attention to What's Out There
  • Not All Information Is Valid
  • Think Before You Click
  • Reading URLs
  • Faking sites with URLs
  • Privacy
  • Expectations and Reality
  • Who Has Ownership?
  • Where Are Your Files Stored?
  • How Important Is Your Data?
  • Once It's Out There, It's Out There
  • Encryption
  • Encrypting Storage
  • Encrypting mobile devices
  • Secure Communication on the Internet
  • Monitoring Online Activity
  • Monitoring Your Bank Account
  • Identifying the Devices You Use, and Where You Use Them
  • Separating Home and Business Computers
  • Bring your own device
  • Computer Use in Public Places
  • Mobile Devices
  • Mobile apps
  • Information shared and collected by apps
  • Location feature
  • Smart TVs and Game Systems
  • Internet of Things
  • Using Different Windows Accounts
  • Biometrics
  • Physical Security
  • Locking Down Hardware
  • Summary
  • Further Reading
  • 2 Before connecting to the Internet
  • Securing Your Web Browser
  • Cookies
  • Tracking Protection
  • Disabling and Managing Pop-Ups
  • Wi-fi Security and Safety
  • A Basic Understanding of Components Used to Connect to the Internet
  • Configuring Your Router
  • Changing the administrator username/password
  • Service set identifier
  • Security mode
  • SSID passphrase
  • Using Other People's Wi-Fi
  • Sharing Your Wi-Fi With Others
  • Setting up a guest network
  • Passwords
  • Strong Passwords
  • Changing Passwords
  • Password Policies
  • Setting Up Security Questions
  • Remembering Passwords
  • Tools
  • Password generators
  • Password vaults
  • Passwords stored in IE
  • Passwords stored in Chrome
  • Google smart lock
  • Firewalls
  • Firewall on a Router
  • Summary
  • Reference
  • 3 Software problems and solutions
  • Malware and Viruses
  • Types of Malware
  • Antivirus
  • Windows Defender
  • Updating
  • Scheduling Regular Scans
  • Rogue Antivirus
  • Antimalware
  • Don't Forget Your Mobile
  • Staying Up-To-Date
  • Types of Updates
  • Automatic Updates
  • Updates in Windows 10
  • Windows 10 peer-to-peer updates
  • Mobile Device Updates
  • Other Device Updates
  • Disaster Recovery
  • Keeping a Copy of Passwords
  • Backing Up Files
  • Online backups
  • Backing up phones and tablets
  • Setting and Restoring Restore Points
  • Summary
  • Reference
  • 4 Email safety and security
  • Email Protection
  • Limiting What Your Email Reveals
  • Choosing an Email Client
  • Securing Thunderbird
  • Why Is It Important to Block Remote Content?
  • Hiding the Message Pane
  • The Dangers of an Attachment
  • Free Email Sites
  • Security Settings on Email Sites
  • Mail.com security
  • Gmail Security
  • Encryption
  • Summary
  • 5 Cybercrime
  • What Is a Cybercriminal?
  • How Criminals Choose Their Targets
  • Identity Theft
  • Controlling the Information You Provide
  • Child Identity Theft
  • Social Engineering
  • Technology and Social Engineering
  • Suspicious Emails and SPAM
  • Baiting
  • Hacking
  • Hijacking/Hacked Accounts
  • Defaced Sites
  • Common Methods
  • Groups
  • Inside jobs
  • Low tech
  • Tools
  • Botnets and Rootkits
  • Password cracking
  • Keylogger
  • Realizing Any Site Could Be Hacked
  • Protecting Yourself
  • Portable tools
  • Scams
  • Advanced Fee Scams
  • Intimidation and Extortion
  • Getting Something for Nothing
  • Free offers and downloads
  • Contests and sweepstakes
  • Online Charities
  • Tax Scams
  • Ransomware and Scareware
  • Summary
  • References
  • 6 Protecting yourself on social media
  • What Is Social Media?
  • Securing Social Media
  • Using the Information You Learn on One Site to Secure Others
  • Monitoring Activity
  • Securing Facebook
  • General
  • Security
  • Privacy
  • Privacy shortcuts
  • Know your audience
  • Timeline and Tagging
  • Lists
  • About
  • Securing Twitter
  • Security
  • Privacy
  • Passwords
  • Securing YouTube
  • Creator Studio
  • Community
  • Channel
  • Blocking and reporting
  • Restricted mode
  • Summary
  • References
  • 7 Finding a job online
  • Looking for Work Online
  • Fraudulent Job Posts
  • Research the Company
  • Social media and bogus companies
  • Recruiters
  • Background and Credit Checks
  • Interviews
  • Online Resumes
  • Online Applications
  • Clean Up Your Digital Presence
  • Work-at-Home Scams
  • Securing LinkedIn
  • Two-Step Verification
  • History
  • Privacy Controls
  • Securing Your Profile
  • Summary
  • References
  • 8 Protecting your reputation
  • Finding Yourself
  • What Not to Do When Searching Yourself
  • Google Alerts
  • Is There a Problem?
  • Other Tools
  • Maintaining Privacy
  • Privacy of Search
  • Untag Yourself
  • Private Browsing
  • Delete the history, clear the cache
  • Automatically clearing private data
  • Tor
  • Virtual private networks
  • Tools
  • Even Though It's Deleted, It May Not Be Deleted
  • Tools
  • Copies others may have
  • Online storage
  • Just because you don't see it, doesn't mean it's not there
  • Think Twice, Post Once
  • Oversharing
  • The Real World and Cyberspace
  • Not Everything Is Internet Based
  • Telephone and mail scams
  • Online "Support"
  • Do not call
  • Preventing mail theft
  • Delivery
  • Avoiding Online Records
  • What to Do After a Security Breach
  • Digital Legacies
  • Facebook Memorial Page
  • Summary
  • References
  • 9 Beyond technology-dealing with people
  • Netiquette
  • Emoticons
  • Understanding the Lingo
  • Anonymity
  • The Effect Perceived Anonymity Has on People
  • Being Wary of Others and Yourself
  • The Falsehood of Anonymity
  • The Flip Side of Anonymity
  • Annoying and Abusive People
  • Online Harassment
  • Trolls and Flamers
  • Creeping
  • Cyberstalking
  • Protecting Yourself
  • Thinning the Herd
  • Unfriend, unfollow, unjoin
  • Blocking people
  • Does losing anonymity help?
  • Reporting abuse
  • Online Chat
  • Picking an Alias
  • Instant Messaging
  • Chat Rooms
  • Web Cams
  • Online Gaming
  • Romance scams
  • Online Dating
  • Traditional versus Extramarital
  • Sites
  • Apps
  • Meeting People in Person
  • Protecting Yourself
  • Checking Whether a Person Is Who They Say They Are
  • Reviewing profiles
  • Image search
  • Summary
  • References
  • 10 Protecting your kids
  • Protecting Your Kids
  • Passwords for Kids
  • Search Engines
  • Kid-Orientated Search Engines
  • Parental Controls
  • Understanding What They're Using
  • Parental Controls in Windows
  • Filtering and blocking
  • Limiting Time and the Times They're Allowed Online
  • Deciding on Age Appropriate Limitations
  • Location of Computer
  • Location
  • Lost or Stolen
  • Antitheft
  • Other apps and sites
  • Finding a Device Finds a Person
  • Finding it safely
  • Report It Stolen
  • Blacklists
  • Remote wiping
  • Resale
  • Talking About What's Inappropriate
  • Setting Expectations
  • Conduct
  • Content
  • Contact
  • Cyberbullying
  • Calls
  • Online Predators
  • Privacy
  • Summary
  • References
  • Index
  • Back Cover

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

26,12 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
PDF mit Adobe DRM
siehe Systemvoraussetzungen
Hinweis: Die Auswahl des von Ihnen gewünschten Dateiformats und des Kopierschutzes erfolgt erst im System des E-Book Anbieters
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok