Index
A
Account recovery
Active advertising
Ad blocking, ethics
Admin account
Mac OS
administrator password dialog
logout menu
remove administrator confirmation dialog
restart menu
users/groups preferences
users login options
Windows 10
accounts search
add user
answer security questions
change account type dialog
change account type, to administrator dialog
change account type, to standard user dialog
create account dialog
family and other users settings
local account, creation
login screen
sign-out menu
Adware
Alphabet character mappings
Antivirus (AV) software
installation
Mac OS
Windows 10
Apple credit card (Apple Card)
Apple online account
lock down
disable Keychain backup
iCloud settings
privacy restriction
security & privacy settings
Apple’s drive encryption utility (FileVault)
Asymmetric encryption
Attackers
Authentication and message integrity
Automatic voltage regulation (AVR)
Automobiles
Auto-update
Mac OS
Microsoft Windows 10
Availability
B
Backups
cloud service
Mac OS
Windows 10
data
encryption, Mac OS
system preferences
time machine backup password dialog
time machine disk selection dialog
time machine preferences
external hard drive
connect to computer
drive size
Mac OS configuration
Microsoft Windows 10 configuration
USB version
online
options
software
UPS
viruses/malware
Bandwidth
Banking/shopping online
Biometrics
Bitcoins
Blogs/websites
Bluetooth
Bluetooth wireless technology
Bob’s public key
Bot
Botnets
Brave browser
Brute-force attack
Built-in security features
Bytes
C
Cable modem
California Consumer Privacy Act (CCPA)
Cambridge Analytica scandal
CAPTCHAs
Castle guards
Central processing unit (CPU)
Certificate authorities (CAs)
Certificates
Chrome browser
Chrome OS
Cipher text
Clean up
Mac OS
Microsoft Windows 10
Clearview AI
Cloud backup
Cloud computing
Cloudflare
Cloud storage services
Communications
e-mail
secure
text messaging
Computer
beware cold calls
sale and donation, checklist
Mac OS
Windows
unplug webcams
Confidentiality
Controlled folder access
Cookie
Credential stuffing
Credit bureaus
Credit card fraud
Credit freeze
Cryptanalysis
Cryptographic hashing function
Cryptography
Cryptomining
Custom Wi-Fi router software
Cyberbullying
D
Data brokers
Decentraleyes
Decryption algorithms
Dedicated guest Wi-Fi router
Dedicated secure computer
Detection
Device encryption
Digital basket
Digital estate planning
Digital executor
Digital information
Digital mailbox
Disk encryption
Mac OS
Windows 10
Distributed denial of service (DDoS)
DNS settings
Firefox settings search
Mac OS, network adapter settings
Windows 10
active networks
connection status
IPv4
IPv4 network properties
IPv6 DNS settings
network & internet settings
Domain Name Service (DNS)
Dox-Ray machine
Dropbox
DuckDuckGo
E
Electronic frontier foundation (EFF)
E-mail
account activity info
attachments
encrypted service
hacking
public and private uses, accounts
unused accounts
Encrypted communications mechanism
Encrypted E-mail service
Encryption
End-to-end encryption
End-user license agreement (EULA)
Equifax
Ethernet cables
Exchange Image File format (EXIF) data
External backup hard drive
External hard drive
F
Fake email
Fast Identity Online (FIDO)
Fastmail
FIDO hardware key (YubiKey)
File deletion
Find my Mac, set up
Firefox
add-ons menu
DNS over HTTPS setting
extension
installation
NoScript install
security and privacy settings
certificates settings
data collection and use settings
do not track setting
enhanced tracking protection
forms and passwords settings
history settings
permissions settings
preferences
security settings
updates settings
send files securely
file sent
password and expiration settings
secure download link
send drag and drop window
settings search for DNS
Firewalls
Full hard drive encryption
G
General Data Protection Regulation (GDPR)
Gigabits per second (Gbps)
GNU Privacy Guard (GPG)
Google Authenticator
Google’s search engine
Guest network
H
Hard drive, erase
Hardware and software
bandwidth
bits/bytes
bluetooth
cloud
clients and servers
file manager
IoT
net neutrality
networks (wired and wireless)
storage
Hardware bugs
Hashing
HTTPS everywhere
Hypertext Transfer Protocol (HTTP)
I
iCloud
Identify theft
Identity fraud
ID theft after death
Information leakage
Infrared (IR) remotes
Instant messaging (IM)
Integrity
Internet
adult content
downloading
HTTP
mailbox
packets
routing
uploading
USPS
Internet of Things (IoT)
Internet Protocol (IP)
Internet service provider (ISP)
Intranet
Intrusion detections systems (IDSs)
IP version 6 (IPv6) versions
J
Jailbreaking
Juice jacking
Junk e-mails
K
Keka
compression preferences
encrypted archive, creation
file save dialog
password-protected archive settings
Key loggers
L
LastPass
account sign-up form
App installation, smartphone
authenticator
browser icons
copy password
deleted saved passwords
disable password saving
“Fill” button
generate strong passwords
offline passwords
one-time passwords generation
passwords adding
password vault
saved passwords
security challenge
security, country restrictions
store credit cards
two-factor authentication, enabling
authenticator setup
multifactor options
QR code, initializing authenticator
vault tour
web browser, installation
welcome message
Local area networks (LANs)
M
Mac configuration
Mac OS Time Machine backup
Macs are safer than PCs
Mailbox
Malicious software
SeeMalware
Malvertising
Malware
bot
components/behaviors
cryptomining
PUP
Ransomware
rootkit
Scareware
spyware
Trojan
virus/worm
Man-in-the-middle attack
Marketing data analysis
Master password
Megabits per second (Mbps)
Metadata
Microsoft Accounts
Microsoft online account
lock down
activity history settings
diagnostics & feedback settings
general privacy settings
Microsoft’s encryption utility (BitLocker)
Mobile-oriented messenger apps
Mobility
Modem
Moderate password
Modern cryptography
Multifactor authentication
Multiparty video chats
N
National Consumer Telecommunications and Utilities Exchange (NCTUE)
National Security Agency (NSA)
Near-field communication (NFC)
Net neutrality
Network
cable modem
Wi-Fi router
Network Address Translation (NAT)
Nitty-gritty certificate information
Non-admin accounts
O
Offline attack
OneDrive
Online accounts
freeze your credit
lock down
Apple
Microsoft
restrictions, financial accounts
terms of service, read
turn on account alerts
use credit cards
virtual credit card number
Online attacks
Online backup
Online banking
Open source software
Operating system (OS)
Mac
Microsoft Windows 10
Optimism
Opt out of tracking
P
Packets
Panopticon
Paper shredder
Parental guidance
able to access all accounts and devices
age restrictions
computers in common area, house
contract creation, kids
dedicated account for each child
device tracking, use
email accounts creation, children
Mac OS
Windows 10
family friendly DNS
Golden Rule
Grandmother Rule
lock down chromebook settings
resources
teach your kids
young children
Passive advertising
Passwords
computer accounts
Mac OS
Microsoft Windows 10
haystacks
manager
master
periodically changing
router
scrambling process
2019’s hacked passwords
somewhere safe
special characters
strength
two-factor authentication
PDF reader app
Personal identification number (PIN)
Phishing
Pi Hole
Podcasts
Pop-ups offering/requiring plugins
Portable Document Format (PDF) file
Potentially unwanted program (PUP)
Pretty good privacy (PGP)
Prevention
Privacy
badger
matters
vs. security
threats
Private browser
Private cloud storage services
Private key
Private networks
Professional cybersecurity
ProtonMail
Public charging stations
Public Internet
Public key
Public network
Public/private key pairs
Punycode misleading web address
Q
Quality of service (QoS)
R
Radio frequency (RF) technology
Random access memory (RAM)
Ransomware
Recovery key
Restrict access to folders and files
Rich Communications Services (RCS)
Rootkit
Rotational cipher
ROT13 rotational cipher
Router
default SSID
disable external admin
disable external services
firmware update
guest Wi-Fi network
IP addresses and admin credentials
passwords
S
Safari
Sandboxing
Scareware
Scrambled passwords
Secure browser
SecureDrop
Secure messaging apps
Secure, quick, reliable login (SQRL)
Security threats
Security through obscurity
Self-signed certificate
Sensitive files, securely erase
Mac OS
empty trash
secureErase command
terminal search in Spotlight
Windows
empty recycle bin
free space
PowerShell search
Service set identifiers (SSIDs)
7-Zip
archive creation
password-protected archive settings
Shelf security and privacy tools
ShieldsUp
Short message service (SMS)
SIM jacking
Smartphone
Apple’s iOS vs. Android OS
avoid cheap android phones
back up
Android
iOS
biometric locks
device up to date
disable Bluetooth and NFC
disable Wi-Fi auto-connect
enable (self) tracking
enabling lockdown mode
erase data
Android
iOS
hackers
iOS is way safer than Android
jailbreaking
limit ad tracking
lock
medical ID, enable
permission schemes
privacy
remove unused apps
restrict application permissions
secure messaging apps
USB condom use
use Firefox browser
VPN install
wireless madness
Social media
avoid TikTok
close accounts
delete Facebook history
DNA services
don’t broadcast your travel plans
don’t divulge too much personal info
don’t give out your e-mail credentials
enable two-factor auth
lock down, accounts
privacy-respecting alternatives
Scrub your files before sharing
who can see your stuff
Solid-state drive (SSD)
Spam
deal properly
favored delivery mechanism
filters
phishing
solutions
stopping
Special characters
Spoofed messages
Spring cleaning
Spyware
Storage
Strip-cutting shredders
Substitution ciphers
SuperLock
Symmetric cipher
Symmetric encryption
Symmetric locking mechanism
T
Telnet
Texas Instruments TI-99/4A personal computer
Text messaging
Third-party cookie tracking method
Threat analysis
credit card fraud
e-mail hacking
identity theft
phishing
spam and scams
tracking and surveillance
viruses and malware
Throwaway e-mail accounts
e-mail aliases
Firefox private relay
shared logins
sign-in with Apple
Too much information (TMI)
Tor browser
Tracking
Tracking cookies
Transport Layer Security (TLS)
TransUnion
Trojan
Trustworthy certificate
Two-factor authentication (2FA)
U
uBlock origin
Unbreakable encryption
Uninterruptible power supply (UPS)
Unique password
Universal Plug and Play (UPnP)
Unlimited overdraft protection
USB devices and ports
US Office of Personnel Management (OPM)
V
Video chats
Virtual credit card number
Virtual machine (VM)
Virtual private network (VPN)
Viruses
VPN
W
Web addresses
Web browsers
advertising
e-mail read
Firefox
SeeFirefox
security and privacy
Web CAPTCHA form
Website password breach
Web tracking
Lightbeam
Panopticon
Wikipedia graph
Wikipedia + Yahoo graph
Yahoo + Amazon + CNN graph
Yahoo + Amazon graph
Wide area network (WAN)
Wireless encryption protection (WEP)
Wireless Fidelity (Wi-Fi)
disable auto-connect
hotspots
ISP’s, turn off
network
routers
Wireless LANs (WLANs)
Wireless madness
Wireless Protected Access (WPA)
Wireless Protected Setup (WPS)
X, Y
Xfinity Wi-Fi
Z
Zero-day exploit
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.46.109