Home Page Icon
Home Page
Table of Contents for
Other Apress Business Titles You Will Find Useful
Close
Other Apress Business Titles You Will Find Useful
by Eric J. Rzeszut, Daniel G. Bachrach
10 Don'ts on Your Digital Devices: The Non-Techies Survival Guide to Cyber Security and Privacy
Cover
Title
Copyright
Apress Business: The Unbiased Source of Business Information
Dedication
Contents
Foreword
About the Authors
Acknowledgments
Introduction
Chapter 1: Don’t Get Phished
A Closer Look at “Phishing”
“Target”-ed Phishing
Other Forms
What Should You Do?
Additional Reading
Chapter 2: Don’t Give Up Your Passwords
Where Did Passwords Come From?
Password Threats and New Solutions
Alternatives to the “Simple” Password: Biometrics and Two-Factor Authentication
Bigger Can Be Better. . .
Mix It Up
Protecting Passwords
What Should You Do?
Additional Reading
Chapter 3: Don’t Get Lost in “The Cloud”
What Is “The Cloud”?
Cloud Controversy and Risks
Formalizing an Informal Relationship
Data Breaches
Not Just for Storage Anymore
Reliability
Accessibility
What Should You Do?
Additional Reading
Chapter 4: Don’t Look for a Free Lunch
Software—Consider the Source
Issues with Warez
Hidden Agenda
Lesser Threats
How to Protect Yourself
Additional Reading
Chapter 5: Don’t Do Secure Things from Insecure Places
Background: Wireless Networking at Home, at Work, and on the Road
Home Sweet Home. . .
Back at the Office. . .
On the Road Again. . .
Encryption Standards
VPN
Workplace Security, on the Road
Extra Layers of Protection
Other Uses for VPNs
Additional Reading
Chapter 6: Don’t Let the Snoops In
Who Are the “Snoops”?
Boundless Informant
PRISM
Tempora
MUSCULAR
FASCIA
Dishfire
Optic Nerve
So, Who Else Is Snooping?
For-Profit Corporations
Employers
Where Your Data Are…
Data on the Move
Taking an Active Role in Protecting Your Data
Data at Rest
Additional Reading
Chapter 7: Don’t Be Careless with Your Phone
Mobility in the 21st Century
When It’s the Employee’s Device, but the Company’s Resources—BYOD
When It’s the Company’s Device, but Used at the Employee’s Discretion—COPE
Know Your Rights
Physically Securing Your Phone
Start Me Up—but Not Without a Password
When a Password Isn’t Enough
Losing (and Finding!) the Key to Your Digital Life
Mobile Law
Insecure Background Wireless Networks
Don’t Trust a Wireless Network Based on Its Name
Don’t Trust Your Phone to Connect for You
Bluetooth Hacking
Malware Apps
Operating System Updates
Additional Reading
Chapter 8: Don’t Use Dinosaurs
Software: It Has an Expiration Date
The “Good Old Days” of Software
New Software for a New Era
Don’t Forget About Mobile Apps
Windows XP
Not Just Windows
Not Just Operating Systems
Not Just Desktops and Laptops
What Can You Do?
Additional Reading
Chapter 9: Don’t Trust Anyone Over . . . Anything
What Is Social Engineering?
Keep Your Eye on the Ball
Hooking the Phish
Social Engineering via Social Networking
Knowledge Is Power
Big Companies, Big Problems
Ransomware
In-Person Tricks
Not Your Mother’s Kind of Tailgating
How to Combat Social Engineering
Additional Reading
Chapter 10: Don’t Forget the Physical
Physical Security: An Overview
Physical Security at Home
Letting Outsiders In
Removing Temptation
Don’t Blanket the Neighborhood with Wi-Fi
Physical Security at Work
Limit Your Paper (or Whiteboard) Trails
Keep Company Devices Secured and Keep Them out of the Wrong Hands
Physical Security on the Road
Thieves Are Everywhere
Don’t Let Your Devices out of Your Sight, Ever
Don’t Let Strangers Touch Your Devices
What if It Gets Stolen?
Additional Reading
Conclusion
Don’t Make It Easy for the Bad Guys
Be Suspicious, and Trust Your Instincts
Keep the Home Front Safe
Watch for New Technologies
Keep Your Hands off Old Machines
Maintain Your Privacy
Most Important—Be an Educated and Informed Digital Consumer!
Index
Other Apress Business Titles You Will Find Useful
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Other Apress Business Titles You Will Find Useful
How to Speak Tech
Trivedi
978-1-4302-6610-5
The InfoSec Handbook
Rao/Nayak
978-1-4302-6382-1
Advanced API Security
Siriwardena
978-1-4302-6818-5
Platform Embedded
Security Technology
Revealed
Ruan
978-1-4302-6571-9
Healthcare
Information Privacy
and Security
Robichau
978-1-4302-6676-1
Building the
Infrastructure for
Cloud Security
Yeluri/Castro-Leon
978-1-4302-6145-2
Expert Oracle
Application Express
Security
Spendolini
978-1-4302-4731-9
Pro ASP.NET Web
API Security
Lakshmiraghavan
978-1-4302-5782-0
Managing Risk and
Information Security
Harkins
978-1-4302-5113-2
Available at
www.apress.com
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset