Nihad A. Hassan and
Rami Hijazi
Nihad A. Hassan
New York, USA
Rami Hijazi
Toronto, Canada
Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the book's product page, located at www.apress.com/9781484227985 . For more detailed information, please visit www.apress.com/source-code .
ISBN 978-1-4842-2798-5
e-ISBN 978-1-4842-2799-2
DOI 10.1007/978-1-4842-2799-2
Library of Congress Control Number: 2017947159
© Nihad A. Hassan and Rami Hijazi 2017
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Printed on acid-free paper
To my mom, Samiha, thank you for everything. Without you, I’m nothing.
—Nihad A. Hassan
Digital Privacy and Security Using Windows is about the skills you need to survive in today’s digital age. This book presents you with a wide array of methods and techniques to fight digital crime, protect your privacy, and prevent others from tracking you when you are online.
The Internet is full of risks! Cybersecurity threats and incidents have increased lately, leading to significant economic and social consequences for business organizations and individuals. We know that global mass surveillance is now a reality after the continued revelations of secret documents via WikiLeaks. We live in the golden age of government and corporate surveillance, where everyone spies on everyone else. As our society moves to become more digitally dependent and devices get increasingly connected, we are being exposed to greater cybersecurity threats, which are expected to intensify in the future.
Digital Privacy and Security Using Windows is an important tool in the arsenal of any computer user who values privacy. This book provides useful information for people who know a little about cybersecurity risks but want to know more; it teaches them in a practical way how to secure their communications and data in the virtual world through a plethora of security tools and protective measures. Professional users will also find this book useful because it will draw their attention to current and future cyber-threats and how to mitigate them properly.
This unique book will teach you in a practical step-by-step manner how to become digitally invisible. You will learn how to secure your online communications and become anonymous online. You will learn how to secure your online identity, encrypt your digital data at rest and in transit, secure personal devices, secure your online presence, secure cloud data and the Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You also will learn best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows.
In the ever-changing online world, acquiring cybersecurity knowledge is a must for any computer user, and this book will teach you everything you need to know to feel confident when going online.
The following people will benefit from this book:
End users
Journalists and human rights activists
Management staff in different industries
Information security professionals
Information security students
Any user seeking privacy
Here is a brief description of each chapter’s contents:
Chapter 1 , “Introduction to the Current Status of Online Privacy” : This chapter discusses the status of online privacy in today’s world; it talks about different parties that are interested in having your personal data and the motivation behind that. It also differentiates between the two types of private information available online and how each one can be exploited to track users’ online activities. This chapter also explains how web tracking technologies work to connect users’ web browsing behavior to their real identity and finally concludes with talking about the different regulations that exist worldwide for dealing with digital privacy and handling users’ personal data across national borders.
Chapter 2 , “Essential Privacy Tips” : This chapter gives you important advice to assure your privacy when going online. It begins by talking about cybersecurity risks and then moves on to give suggestions to mitigate those risks. Protecting kids’ privacy and handling data in the cloud are also covered within this chapter.
Chapter 3 , “Windows Security” : In this chapter, we present ways to harden the Windows OS so it becomes more privacy friendly. Data destruction techniques and Windows 10 privacy settings are also covered in detail.
Chapter 4 , “Online Anonymity” : This chapter teaches you everything you need to know to become invisible online, including web browsing using TOR, using virtual private networks and proxies, configuring web browsers to cover your digital footprint, and using anonymous payments via bitcoins. This chapter is your ultimate guide for disappearing online.
Chapter 5 , “Cryptography and Secure Communication” : This chapter teaches you how to protect your private data using cryptography, which includes two major subcategories: encryption and steganography. In the encryption section, we discuss how to obscure your data at rest and in transit by scrambling it; in the second section, we briefly cover steganography and give examples on how to use some of its techniques to hide your private data in plain sight.
Chapter 6 , “What’s Next?” : This is the final chapter, where we talk about future trends and advancements in computing technology and how they will affect your privacy.
To comment or ask technical questions about this book, send an e-mail to [email protected] .
For additional references about the subject, computer security tools, tutorials, and other related matters, check out www.DarknessGate.com .
I start by thanking God for giving me the gift to write and convert my ideas into something useful. Without God’s blessing, I would not be able to achieve anything.
I want to thank Rami Hijazi for always being there; his precious feedback has always enlightened my road. Even after years of working together, I am constantly surprised by his amazing intelligence, innate humility, and genuine friendship.
I’d also like to thank John Walker, the book’s technical editor. It was a great honor to work with such an experienced cybersecurity mind. John is an encyclopedia of cybersecurity; he put decades of pure cybersecurity experience in our hands while authoring this book. I consider him the best man in the field. His valuable feedback, fast response, and dedicated work helped us to shape this book. Thank you, John, you are simply the best.
Now, I want to thank the ladies at Apress: Susan, Rita, and Laura. I was pleased to work with you and very much appreciate your valuable feedback and suggestions. I hope I have the chance to work with you again.
Specifically, to book acquisitions editor Susan McDermott, thank you for believing in my book’s idea and for your honest encouragement before and during the writing process. I hope I have the chance to work with you again. To book project editor Rita Fernando, you’ve been very supportive during the writing process. You made authoring this book a joyful journey. To book development editor Laura Berendson, thank you very much for your diligent and professional work in producing this book.
I also want to thank all the Apress staff who worked behind the scenes to make this book possible and ready for launch. I hope you will continue your excellent work in creating highly valued computing books. Your work is greatly appreciated.
Finally, I want to thank Jodi L. Colburn for her help at the start of my career as an information security professional. I will always remember your encouragement and faithful advice.
—Nihad A. Hassan
Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research on different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides.
Nihad focuses on computer forensics and anti-forensics techniques on the Windows OS. He has completed numerous technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and anti-forensics techniques. Recently, he has shifted his focus toward digital privacy and security.
Nihad has authored two books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and web security assessment. He covers different information security topics and related matters on his blog at www.DarknessGate.com . Nihad has a BSc honors degree in computer science from the University of Greenwich in the United Kingdom.
Nihad can be reached through his web site, www.ThunderWeaver.com , and you can connect to him via LinkedIn at https://www.linkedin.com/in/darknessgate/ .
Rami Hijazi is the general manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. He is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, e-commerce, agile development, database design, and data handling analysis. Rami also works as a consultant to Cyber Boundaries Inc., where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, and planning and development advice for IT departments concerning contingency planning.
John Walker CFIP, FRSA, served 22 years in the Royal Air Force in security, investigations, and counterintelligence operations (both overt and covert), working with Government Communications Headquarters (GCHQ), Communications-Electronics Security Group (CESG), and other British intelligence agencies, as well as U.S. agencies. He is a visiting professor at the School of Science and Technology at Nottingham Trent University and has been a visiting professor/lecturer at the University of Slavonia, a visiting lecturer at Warwick University, and a visiting lecturer of digital forensics at the National Defence University of Malaysia. John is a registered expert witness, certified forensics investigator practitioner, editorial member at MedCrave Research for forensics and criminology, ENISA CEI expert, editorial member of the Cyber Security Research Institute, digital forensics/cybersecurity trainer at Meirc in Dubai, and fellow of the Royal Society of Arts.
18.189.178.237