Index
Note: Page numbers followed by “b” and “f” refer to boxes and figures, respectively.
A
unfriend, unfollow, unjoin,
188–189
Administrator account,
23
Advanced Encryption Standard (AES),
38
Advertising-supported software (Adware),
54
unfriend, unfollow, unjoin,
188–189
being wary of others and yourself,
182–183
App Passwords section,
124
Asymmetric cryptography,
12
Automated Filters settings,
136
Windows 10 peer-to-peer updates,
67–68
B
backing up phones and tablets,
72–73
Bank account, monitoring,
16
BitTorrent technology,
183
Blackberry Blend program,
73
Blacklist section,
83,
136
Bring Your Own Device (BYOD),
17
Bulletin Board Systems,
180
Business computers,
16–22
C
Child identity theft,
90–91
Client authentication,
14
Cloud,
Comments and Ratings section,
137
blocking and reporting,
137
device identification,
16–22
computer use in public places,
18
separating home and business computers,
16–22
smart TVs and game systems,
21–22
expectations and reality,
7–8
information importance,
11–12
issues,
monitoring online activity,
15–16
thinking before clicking,
validating information,
3–4
in physical world, ,
using Windows accounts,
22–25
criminals choosing targets,
88
hijacking/hacked accounts,
97–98
intimidation and extortion,
110
social engineering,
91–96
suspicious emails and SPAM,
94–95
theft identification,
88–91
child identity theft,
90–91
controlling provides information,
89–90
criminals choosing targets,
88
Do Not Call registry,
171
preventing mail theft,
172
telephone and mail scams,
170
D
account activation and deactivation,
167
Default Settings section,
136
Defer upgrades option,
66
Device activity & notifications link,
84–85
Device history section,
121
Facebook memorial page,
177
backing up phones and tablets,
72–73
setting and restoring restore points,
73–74
Discoverability setting,
133
Distributed Denial of Service attack,
104
Do Not Call Registry,
171
Domain name,
E
email sites, security settings on,
81–83
email client selection,
77–79
block remote content,
79–80
dangers of attachment,
80–81
securing Thunderbird,
77–79
limiting email reveals,
76–77
nonidentifying email,
77b
Email safety and security
choosing email client,
77–79
limiting email reveals,
76–77
nonidentifying Email,
77b
checking Gmail security and privacy,
85b
Other Google Account settings link,
84
password recovery features,
83–84
security settings on email sites,
81–83
Mail. com security,
82–83
encrypting storage,
13–14
encrypting mobile devices,
14
secure communication on Internet,
14–15
F
Privacy settings and tools page,
125–128
Facial recognition feature,
24–25
Faking sites with URLs,
5–7
Family Secure service,
91
Federal Trade Commission (FTC),
89
File Transfer Protocol (FTP),
Filter Anonymous Internet Requests,
52
Filter Internet NAT Redirection,
52
Finding job online
background and credit checks,
143
clean up our digital presence,
145–146
professional social networks,
140
Forums and blog comments,
117
G
checking Gmail security and privacy,
85b
Google Account settings,
84
password recovery features,
83–84
Google,
Other Google Account settings link,
84
Graphical user interface (GUI),
29
Guest network, setting up,
40–41
H
Hackers, ,
10,
11,
37,
39,
88,
96,
97,
99,
103,
156
hijacking/hacked accounts,
97–98
botnets and rootkits tools,
104–105
Hijacking/hacked accounts,
97–98
Hyperlinks,
Hypertext Transfer Protocol (HTTP), ,
15
I
child identity theft,
90–91
controlling provides information,
89–90
Instant Messaging (IM),
193
Internal Revenue Service (IRS),
92
International Mobile Equipment Identity (IMEI),
215
before connecting
securing Web browser,
29–34
Wi-Fi security and safety,
34–41
secure communication,
14–15
Internet Crime Complaint Center (IC3),
87–88
Internet Explorer (IE),
29
expectations and reality,
7–8
information importance,
11–12
K
L
Linksys
changing default password on,
36f
Local Security Policy,
43f
Login Approvals feature,
124
Login history section,
121
Login verification checkbox,
132
M
Malwarebytes Anti-Malware,
62
Malwarebytes Anti-Malware Mobile,
19,
20
Malwarebytes app manager,
20f
Malwarebytes privacy manager,
21f
Mobile device encryption,
14
information sharing and collection by apps,
19–20
Malwarebytes
N
National identity number,
144
National Security Agency (NSA),
Netiquette (Network etiquette),
179–181
O
Online communication,
208
traditional
vs. extramarital,
196–197
Online reputation protection
Facebook memorial page,
177
finding yourself in Internet,
153–156
problems in searching,
156
precaution to post personals,
167–168
deleting and retrieving data,
163–167
clean up our digital presence,
145–146
Online surveys,
P
deciding on age appropriate limitations,
210
location of computer,
210
understanding kids activities,
205
Local Security Policy,
43f
remembering passwords,
45–46
setting security questions,
44–45
storing
Peer-to-peer method (P2P method),
67,
67
Personal identification numbers (PIN),
89
Photo tagging setting,
133
Pop-ups, disabling and managing,
33–34
Potentially unwanted programs (PUPs),
59
Precaution to post personals,
167–168
Privacy Checkup menu,
127
Privacy
deleting and retrieving data,
163–167
data and account maintenance,
167
Privacy Rights Clearinghouse’s Chronology of Data Breaches,
156
audiences in Facebook,
127f
automatically clearing private data,
161
Private data clearance,
161
Protecting kids from technology,
201–202
deciding on age appropriate limitations,
210
location of computer,
210
understanding kids activities,
205
kid-orientated search engines,
203–204
talking about inappropriate factor,
218–221
Protocol,
Public places, computer use in,
18
Q
Questionnaires,
R
Internet and non-Internet based factors,
169–172
Do Not Call registry,
171
preventing mail theft,
172
telephone and mail scams,
170
S
SafeSearch filters section,
203
intimidation and extortion,
110
kid-orientated search engines,
203–204
Secure Sockets Layer (SSL),
14–15
Security
Security alerts settings,
84–85
Service set identifier (SSID),
37
Shoulder surfing method,
103
Smart TVs and game systems,
21–22
Social engineering,
91–96
suspicious emails and SPAM,
94–95
social media site on Internet,
119
Software problems and solutions
mobile device updates,
68–69
Symmetric cryptography,
12
T
Technological factors
annoying and abusive people,
184–192
unfriend, unfollow, unjoin,
188–189
being wary of others and yourself,
182–183
traditional
vs. extramarital,
196–197
criminal background check,
199
Tracking
Transport layer security,
14–15
U
Uniform Resource Locator (URL),
4–5,
145
domain name,
shortening services on,
mobile device updates,
68–69
V
Virtual Private Network (VPN),
99,
162
W
Web browser security,
29–34
Chrome privacy settings,
31f
disabling and managing pop-ups,
33–34
tracking protection,
32–33
Web-based technology,
179
Wi-Fi
components to connecting internet,
35
configuring router,
36–38
changing administrator username/password,
36–37
changing default password on Linksys router,
36f
using other people’s Wi-Fi,
38–39
security and safety,
34–41
sharing Wi-Fi with others,
39–41
setting guest network,
40–41
supporting older devices,
41
Wi-Fi Protected Access (WPA),
38
Windows
Windows 8 x and 10,
48–49
Windows 10, automatic updates in,
65–67
Advanced section of Settings tab,
60
scheduling regular scans,
61
Windows Hello feature,
24–25
Wired Encryption Protocol (WEP),
37
Y
Z