Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.
Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.
Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime.
Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online.
Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.
Sprache
Verlagsort
ISBN-13
978-0-08-047808-1 (9780080478081)
Schweitzer Klassifikation
Foreword Chapter 1 Identity Theft: Are You At Risk Introduction Defining Identity Theft Take a Risk Factor Test Why Do They Do It How Do They Get Away with It Recognizing Identity Theft When It Happens Understanding What Electronic Information Is Private Striving for Theft Prevention Keeping Private Information Private Protecting Your Social Security Number Taking Advantage of Marketing Opt-Out Programs Protecting Your Computer Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Protecting Your Hard Drive Introduction Know Your Computer Temporary Files Temporary Internet Files Deleting Files Permanently for Privacy Other Information that Might be on Your Computer What Are You Protecting Antivirus Software:Your First Line of Defense What You Might Not Know about Antivirus Software What Kinds of Software Are Available Performing Signature Updates Is Your Antivirus Software Working Updating Your Software The Number One Mistake People Make Functionality Vs. Secure Updates Installing Security Patches Beware of the Free Stuff Avoiding Account Sharing Common Reasons, Risks, and Deterrents for Sharing Accounts Creating Multiple Accounts in Windows Creating Multiple Internet Connection Accounts Creating Multiple E-mail Accounts with Outlook Express Using Disk and File Encryption Choosing Strong Passwords Avoiding Weak Passwords Tradeoffs: Using Password Storage Creating Strong Passwords You Can Remember Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Keeping Your E-mail Private Introduction E-mail Privacy Is Not Just about Spam How E-mail Services Work Big Brother and Your E-mail How E-mails Can Get Lost Understanding Spam E-mail Attacks Are Not Just about Viruses E-mail Attachments How Your E-mail Can Be Hijacked E-mail Interceptions Recognizing Mail Scams Solicitations and Chain Letters Spam as Social Engineering Using Antivirus Protection for E-mail Hiding Your E-mail Identity Knowing What's in Your E-mail Headers Knowing What Your Chat Says about You Setting Up Anonymous E-mail E-mail Encryption Made Simple Using Pretty Good Privacy (PGP) with Microsoft Outlook Using Personal Certificates with Netscape Verifying E-mail Senders in Outlook Importing a Personal Certificate File into Opera Choosing a Secure E-mail Provider Using Encrypted Web-based E-mail Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Self Defense on the Web Introduction Understanding Risk on the Web Learning to Be Street Smart on the Web Understanding the Privacy Policy Managing Risk on the Web Managing Passwords Protecting Your Purchasing Power Anonymous Web Surfing Improving Browser Safety Updating Your Browser Software Putting Browser Security Features to Work Covering Your Internet Footprints Deleting Hidden Information About You Opting Out of Ad-ware Cookies Summary Solutions Fast Track Frequently Asked Questions Chapter 5 Connecting to the Internet Safely Introduction Different Connections, Different Risks Understanding Network Terminology Dial-up Connections Always-on Broadband Understanding Data Interception Taking Precautions Setting Permissions for Shared Drives and Files Registering Your Domain.