Index

Note: Page numbers followed by “b” and “f” refer to boxes and figures, respectively.

A

About section of profile, 130–131
Abusive people, 184–192
blocking people, 189–190
creeping, 186–187
cyberstalking, 187
losing anonymity, 190–191
online harassment, 185
preventative measures, 187–188
reporting abuse, 190–191
thinning herd, 188
trolls and flamers, 186
unfriend, unfollow, unjoin, 188–189
Activity Log, 119, 119–120
Ad-aware, 62
Administrator account, 23
Advanced Encryption Standard (AES), 38
Advertising-supported software (Adware), 54
Alias, 77, 99, 192–193
Annoying people, 184–192
blocking people, 189–190
creeping, 186–187
cyberstalking, 187
losing anonymity, 190–191
online harassment, 185
preventative measures, 187–188
reporting abuse, 190–191
thinning herd, 188
trolls and flamers, 186
unfriend, unfollow, unjoin, 188–189
Anonymity, 77, 181–184, 182
being wary of others and yourself, 182–183
falsehood, 183
flip side, 183–184
losing, 190–191
Antimalware, 40, 62–63, 108–109, 114
Antitheft software, 210, 211–213
apps and sites, 212
Antivirus, 56–57
App Passwords section, 124
AppBugs, 104–105
Apple Cloud services, 11
Apple Mail, 77
Asymmetric cryptography, 12
Attachment, 75
dangers, 80–81
AutoComplete, 48
Automated Filters settings, 136
Automatic updates, 64–68
Windows 10 peer-to-peer updates, 67–68
in Windows 10, 65–67
Avast antivirus, 57
AVG antivirus, 56

B

Backdoors, 54–55
Backing up files, 70–73
backing up phones and tablets, 72–73
online backups, 71–72
Baiting, 95–96
Bank account, monitoring, 16
Biometrics, 24–25
BitLocker, 13
BitTorrent technology, 183
Black hats, 96
Blackberry Blend program, 73
Blackberry devices, 73
Blacklist section, 83, 136
Blocking, 207–209, 208f
people, 189–190, 189f
Bogus companies, 142
Bookmarking, 117
Botnets, 55
tools, 104–105
Bots, 104
Bots, See Robots (Bots)
Bring Your Own Device (BYOD), 17
Browser hijackers, 55
Bulletin Board Systems, 180
Business computers, 16–22

C

Cache clearance, 160–161
CCleaner, 163, 164f
Changing passwords, 42
Channel link, 136–137
Chat rooms, 193–194
Chatiquette, 193–194
Checkpoint, See Restore point
Child identity theft, 90–91
Child’s safety, 210
ChildScan service, 91
Cipher tool, 163–164
Ciphertext, 12
Click jacking method, 100–101
Client authentication, 14
Clone phishing, 94
Cloud storage, See Online storage
Cloud, 2
services, 165–166
Code generator, 123, 124
Comments and Ratings section, 137
Communication, 192
methods, 185
online, 192
online chat, 192–196
security on Internet, 192–196
Community link, 135–136
Cookies, 30–32
tracking, 7, 30–31, 55–56
Copycat site, 94
Cracker, 96
Cracking passwords, 42
Creator Studio, 135–137
blocking and reporting, 137
channel link, 136–137
community link, 135–136
restricted mode, 137
Creeping, 186–187
Critical updates, 64
Cumulative update, 63
Cyber safety, 1, 76, 95
See also Cybercrime
device identification, 16–22
computer use in public places, 18
Internet of Things, 22
mobile devices, 18–20
separating home and business computers, 16–22
smart TVs and game systems, 21–22
encryption, 12–15
Internet, 2–3
Internet privacy, 7–12
data importance, 10
expectations and reality, 7–8
files storage, 10
information importance, 11–12
ownership, 8–9
issues, 3
monitoring online activity, 15–16
paying attention, 3–7
reading URLs, 4–7
thinking before clicking, 4
validating information, 3–4
physical security, 25–26
in physical world, 1, 2
using Windows accounts, 22–25
biometrics, 24–25
Cyberbullying, 221–223
prank calls, 222–223
Cybercrime, 87–88
See also Cyber safety
cybercriminal, 87–88
criminals choosing targets, 88
hacking, 96–109
common methods, 99–103
defaced sites, 99
hijacking/hacked accounts, 97–98
tools, 103
ransomware, 114
scams, 109–115
advanced fee scams, 109
intimidation and extortion, 110
offers on Internet, 110–112
online charities, 112–113
tax scams, 113
scareware, 114
social engineering, 91–96
baiting, 95–96
suspicious emails and SPAM, 94–95
technology and, 93–94
theft identification, 88–91
child identity theft, 90–91
controlling provides information, 89–90
Cybercriminals, 5–6, 105, 170
criminals choosing targets, 88
Cybersafety, 168–169
Cyberspace, 168–174
Internet-based issues, 169–172
Do Not Call registry, 171
online “support”, 171
preventing mail theft, 172
telephone and mail scams, 170
Cyberstalking, 187

D

Data deletion, 163–167
account activation and deactivation, 167
data sharing, 165
online storage, 165–166
tools, 163–165
Data encryption, 15
Data sharing, 165
Decryption, 86
Defaced sites, 99
Default Settings section, 136
Defer upgrades option, 66
Device activity & notifications link, 84–85
Device history section, 121
Digital legacies, 176–177
Facebook memorial page, 177
Disaster recovery, 69–74
backing up files, 70–73
backing up phones and tablets, 72–73
online backups, 71–72
copy of passwords, 70
setting and restoring restore points, 73–74
Discoverability setting, 133
Distributed Denial of Service attack, 104
Do Not Call Registry, 171
Domain name, 5
Dox, 101
Doxing, 101
Dumpster diving, 103, 169

E

Egosurfing, 153
Email, 75, 120, 122
email settings, 82
email sites, security settings on, 81–83
Email protection, 76–83
email client selection, 77–79
block remote content, 79–80
dangers of attachment, 80–81
hiding message pane, 80
securing Thunderbird, 77–79
limiting email reveals, 76–77
nonidentifying email, 77b
Email safety and security
email protection, 76–83
choosing email client, 77–79
limiting email reveals, 76–77
nonidentifying Email, 77b
free email sites, 81
Gmail security, 83–86
checking Gmail security and privacy, 85b
encryption, 85–86
Other Google Account settings link, 84
password recovery features, 83–84
ISP, 75
security settings on email sites, 81–83
Mail. com security, 82–83
Encryption, 12–15, 85–86
encrypting storage, 13–14
encrypting mobile devices, 14
secure communication on Internet, 14–15
site using HTTPS, 15f
Equifax service, 91
Ethernet, 35
Experian service, 91
Exploits, 55
Extramarital dating sites, 196–197

F

Facebook, 3, 98, 101, 118, 119, 119–120, 177
See also Twitter, LinkedIn, YouTube
memorial page, 177
securing, 121–131
General settings page, 122–123
lists, 129–130
Privacy settings and tools page, 125–128
About section, 130–131
Security settings page, 123–125
Timeline and Tagging settings, 128–129, 128f
Facial recognition feature, 24–25
Faking sites with URLs, 5–7
Family Secure service, 91
Federal Trade Commission (FTC), 89
File Transfer Protocol (FTP), 5
Filter Anonymous Internet Requests, 52
Filter Internet NAT Redirection, 52
Filter Multicast, 52
Filtering, 207–209
Finding job online
background and credit checks, 143
fraudulent job posts, 140–141
Internet, 141
interviews, 143–144
job search sites, 139–140
online resumes, 144–146
clean up our digital presence, 145–146
online applications, 145
professional social networks, 140
recruiters, 142–143
researching company, 141–142
bogus companies, 142
social media, 142
securing LinkedIn, 147–151
work-at-home scams, 146–147
Fingerprint readers, 24
Firewalls, 50–52
See also Encryption
Linksys firewall, 51f
on router, 50–52
Firmware, 21–22
Flamebait, 186
Flamers, 186
Forgot Password link, 90
Forums and blog comments, 117
Fraudulent job posts, 140–141
Free email sites, 81
Freeware, 54

G

General settings page, 122–123
Generic account, 76
Gmail, 75, 81
security, 83–86
checking Gmail security and privacy, 85b
encryption, 85–86
Google Account settings, 84
password recovery features, 83–84
Google, 3
Google Smart Lock, 49–50
Other Google Account settings link, 84
Google mail, See Gmail
Graphical user interface (GUI), 29
Gray hats, 96
Guest account, 23
Guest network, setting up, 40–41

H

Hackers, 2, 10, 11, 37, 39, 88, 96, 97, 99, 103, 156
Hacking, 96–109
common methods, 99–103
groups, 101–102
inside jobs, 102
low tech method, 102–103
defaced sites, 99
hijacking/hacked accounts, 97–98
tools, 103
botnets and rootkits tools, 104–105
keylogger tool, 105
password cracking tool, 104–105
portable tools, 108–109
protection, 107–109
realizing sites, 105–107
Hacktivists, 97
Hashing, 12
hashtag, 132
Headhunters, 142
Hijacking, 98
Hijacking/hacked accounts, 97–98
History deletion, 160–161
Home computers, 16–22
Hotmail, 81
HTTPS, 15, 15f, 108
Hyperlinks, 4
Hypertext Transfer Protocol (HTTP), 5, 15

I

iCloud, 73
Identity theft, 88–91
child identity theft, 90–91
controlling provides information, 89–90
Image search, 199–200
Inbox, 75
Infoencrypt, 85
InfoSecurity Europe, 92
Instant Messaging (IM), 193
Integrity checks, 15
Internal recruiters, 142
Internal Revenue Service (IRS), 92
International Mobile Equipment Identity (IMEI), 215
Internet, 2–3, 35, 141, 146, 153, 180, 202
before connecting
firewalls, 50–52
passwords, 41–50
securing Web browser, 29–34
Wi-Fi security and safety, 34–41
jargon, 181
secure communication, 14–15
social media site, 119
of Things, 22
Internet Crime Complaint Center (IC3), 87–88
Internet Explorer (IE), 29
Internet Explorer 8, 108
Internet privacy, 7–12
data importance, 10
expectations and reality, 7–8
files storage, 10
information importance, 11–12
ownership, 8–9
Internet Service Provider (ISP), 34, 57, 75, 93, 181
Interviews, 143–144
iOS device, 166
IP address, 5, 80, 183

K

Keylogger tool, 105

L

Likejacking, 101
LinkedIn, 140, 140
See also Facebook, Twitter, YouTube
securing, 147–151
history, 148
privacy controls, 148–150, 149f
securing our profile, 150–151
two-step verification, 147–148
Linksys
firewall, 51f
router, 38, 40, 50
changing default password on, 36f
Lists, 129–130
Local Security Policy, 43f
Location controls, 133
Login Approvals feature, 124
Login history section, 121
Login verification checkbox, 132

M

Mail server, 75
Mailbox, 75
Malicious software (Malware), 53, 54–56, 79
Malwarebytes Anti-Malware, 62
Malwarebytes Anti-Malware Mobile, 19, 20
Malwarebytes app manager, 20f
Malwarebytes privacy manager, 21f
McAffee, 57
Media sharing, 117
Metadata, 158
Microblogging, 117
Microsoft, 62
account, 23–24
Microsoft Outlook, 75, 77, 81
operating systems, 63–64
Mobile apps, 19, 63–64
Mobile device encryption, 14
Mobile devices, 18–20
information sharing and collection by apps, 19–20
location features, 20–21
Malwarebytes
app manager, 20f
privacy manager, 21f
Mobile apps, 19
updates, 68–69
Modem, 35
Moderators, 193–194
Monitoring activity, 119–121

N

National identity number, 144
National Security Agency (NSA), 8
Netiquette (Network etiquette), 179–181
emoticons, 179–181
Lingo, 181
Network, 35
Network etiquette, See Netiquette (Network etiquette)
“Nigerian 419 scam”, 109
NoScripting, 108

O

Offsite storage, 72
Online backups, 71–72
Online chat, 192–196
alias, 192–193
chat rooms, 193–194
IM, 193
online games, 195–196
Web cams, 194–195
Online communication, 208
Online dating, 196–198
apps, 197–198
sites, 197
traditional vs. extramarital, 196–197
Online games, 195–196
romance scams, 195
Online harassment, 185
sexual harassment, 187
Online predators, 223–225
Online reputation protection
digital legacies, 176–177
Facebook memorial page, 177
finding yourself in Internet, 153–156
Google alerts, 155, 155f
problems in searching, 156
restriction, 154–155
tools, 156
precaution to post personals, 167–168
oversharing, 168
privacy maintenance, 156–167
deleting and retrieving data, 163–167
privacy of search, 157–158
private browsing, 158–163
untag yourself, 158
real world and cyberspace, 168–174
security breach, 174–176
Online resumes, 144–146
clean up our digital presence, 145–146
online applications, 145
Online storage, 165–166, 166
Online surveys, 7

P

Panda, 57
Parental controls, 204–210, 205f
deciding on age appropriate limitations, 210
filtering and blocking, 207–209, 208f
location of computer, 210
time limits, 209–210
understanding kids activities, 205
in Windows, 206–209, 207f
Passphrases, 37, 41
Password managers, See Password—vaults
Passwords, 36, 41–50, 134
See also Encryption
changing, 42
cracking, 42
tool, 104–105
generators, 46
Local Security Policy, 43f
Password section, 123
policies, 42–44
remembering passwords, 45–46
setting security questions, 44–45
storing
in Chrome, 49
in IE, 48–49
strong, 41–42
tools, 46–50
Google Smart Lock, 49–50
RoboForm, 47f
vaults, 46–47
Pastebin sites, 101
Patches, 63, 64, 68–69
Peer-to-peer method (P2P method), 67, 67
Permanent cookies, See Persistent cookies
Persistent cookies, 30
Personal identification numbers (PIN), 89
Pew Research Center, 135
Pharming process, 95
“Phish”, 94
Phishing process, 93–94
Photo tagging setting, 133
Physical security, 25–26
Plaintext, 12
Polymorphism, 54
Pop-ups, disabling and managing, 33–34
POP3 options, 82
Potentially unwanted programs (PUPs), 59
Precaution to post personals, 167–168
oversharing, 168
Pretexting method, 91–92
Privacy Checkup menu, 127
Privacy
controls in LinkedIn, 148–150, 149f
shortcuts, 126–127
in Twitter, 133–134
Privacy maintenance, 156–167
deleting and retrieving data, 163–167
data and account maintenance, 167
data existence, 165
online storage, 165–166
tools, 163–165
privacy of search, 157–158
private browsing, 158–163
untag yourself, 158
Privacy Rights Clearinghouse’s Chronology of Data Breaches, 156
Privacy settings and tools page, 125–128, 125f
audiences in Facebook, 127f
privacy shortcuts, 126–127
Private browsing, 158–163
automatically clearing private data, 161
clearing cache, 160–161
deleting history, 160–161
tools, 162–163
Tor browser, 161–162
VPN, 162
Private data clearance, 161
Private-key cryptography, See Symmetric cryptography
Profiles review, 199
Protecting kids from technology, 201–202
cyberbullying, 221–223
prank calls, 222–223
location, 210–218
antitheft, 211–213
blacklists, 215–216
finding device, 213–214, 213f
finding safely, 214
lost or stolen, 210–211
remote wiping, 216
report it stolen, 214–216
resale, 216–218, 217f
online predators, 223–225
parental controls, 204–210, 205f
deciding on age appropriate limitations, 210
filtering and blocking, 207–209, 208f
location of computer, 210
time limits, 209–210
understanding kids activities, 205
in Windows, 206–209, 207f
passwords for kids, 202–203
privacy, 225–226
search engines, 203–204
kid-orientated search engines, 203–204
talking about inappropriate factor, 218–221
conduct, 219–220
contact, 220–221
content, 220
setting expectations, 219–221
Protocol, 5
Public key cryptography, See Asymmetric cryptography
Public places, computer use in, 18

Q

Questionnaires, 7

R

Ransomware, 55, 114
Real world, 168–174
avoiding online records, 173–174
delivery, 172–173
Internet and non-Internet based factors, 169–172
Do Not Call registry, 171
online “support”, 171
preventing mail theft, 172
telephone and mail scams, 170
Real-time protection, 59
Realizing sites, 105–107
Reconnaissance, 99–100
Remote Access Trojan (RAT), 54–55, 194–195
Remote wiping, 216
Reporting abuse, 190–191
Restore point, 73–74
RoboForm, 47, 47f
Robots (Bots), 55
Rogue antivirus, 61
Rootkits tools, 55, 104–105
Router, 35
firewalls on, 50–52

S

SafeSearch filters section, 203
Scams, 109–115
advanced fee scams, 109
intimidation and extortion, 110
offers on Internet, 110–112
contests and sweepstakes, 111–112
free offers and downloads, 110–111
online charities, 112–113
tax scams, 113
Scareware, 55, 114
Script kiddies, 101
SD cards, 216–217
Search engines, 154, 157, 157, 203–204
kid-orientated search engines, 203–204
Secure Sockets Layer (SSL), 14–15
Security
breach, 174–176
mode, 37–38
in Twitter, 132–133
updates, 64
Security alerts settings, 84–85
Security and privacy page, 133–134
Security Settings page, 119–120, 120, 120–121, 120f, 123–125
Service packs, 63, 64
Service set identifier (SSID), 37
passphrase, 38
Session cookies, 30
Shareware, 54
Shoulder surfing method, 103
Signature files, 60–61
SIM card, 216–217
SkyDrive, 166
Smart TVs and game systems, 21–22
SmartScreen Filter, 108
Social engineering, 91–96
baiting, 95–96
suspicious emails and SPAM, 94–95
technology and, 93–94
Social media, 117–118, 142, 183, 184, 206
email, 76
securing, 118–121
monitoring activity, 119–121
social media site on Internet, 119
securing Facebook, 121–131
securing Twitter, 131–134
Social networking, 118
Social news, 118
Software problems and solutions
antimalware, 62–63
antivirus, 56–57
disaster recovery, 69–74
malware, 53–56
natural disaster, 53
updates, 63–69
automatic updates, 64–68
mobile device updates, 68–69
other device updates, 69
types, 63–64
viruses, 53–56
Windows Defender, 57–62
SPAM, 76, 81, 83, 94, 94–95, 174
Spambot, 94–95, 104
Spammer, 94–95, 98
Spear phishing, 94
Spybot, 62
Spyware, 55–56
Standard account, 23
Stored cookies, See Persistent cookies
Strong passwords, 41–42
Subdomains, 5–6
Suspicious emails, 94–95
Symantec, 57
Symmetric cryptography, 12

T

Tailgating, 103
Tax scams, 113
Technological factors
annoying and abusive people, 184–192
blocking people, 189–190
creeping, 186–187
cyberstalking, 187
lose anonymity, 190–191
online harassment, 185
preventative measures, 187–188
reporting abuse, 190–191
thinning herd, 188
trolls and flamers, 186
unfriend, unfollow, unjoin, 188–189
anonymity, 181–184, 182
being wary of others and yourself, 182–183
falsehood, 183
flip side, 183–184
netiquette, 179–181
emoticons, 180
Lingo, 181
online chat, 192–196
alias, 192–193
chat rooms, 193–194
IM, 193
online games, 195–196
Web cams, 194–195
online dating, 196–198
apps, 197–198
sites, 197
traditional vs. extramarital, 196–197
online entity, 198
protection, 198–200
criminal background check, 199
image search, 199–200
reviewing profiles, 199
Teen’s phone, 210
Teens, 206, 220
Thinning herd, 188
Thunderbird, 77
securing, 77–79
Timeline and Tagging settings, 128–129, 128f
Tor browser, 161–162
Tracking
cookies, 7, 30–31, 55–56
protection, 32–33
Traditional dating sites, 196–197
Transport layer security, 14–15
TransUnion service, 91
Trojan, See Trojan Horse
Trojan Horse, 56
Trolls, 186
Trusted Contacts section, 124–125
Twitter, 102, 121
See also Facebook, LinkedIn, YouTube
securing, 131–134
passwords, 134
privacy, 133–134
security, 132–133
tweeter, 131
tweets, 131
Two-step verification, 84, 147–148

U

Uniform Resource Locator (URL), 4–5, 145
parts, 6f
reading URLs, 4–7
domain name, 5
faking sites with, 5–7
shortening services on, 6
Updates, 63–69
automatic updates, 64–68
mobile device updates, 68–69
other device updates, 69
types, 63–64
updating, 60–61
Username, 36
Username section, 122

V

View As feature, 127
Virtual Private Network (VPN), 99, 162
Virus, 53–56

W

Web browser security, 29–34
Chrome privacy settings, 31f
cookies, 30–32
disabling and managing pop-ups, 33–34
“Microsoft shops”, 30
tracking protection, 32–33
Web cams, 194–195
Web Filter, 52
Web-based technology, 179
Whaling process, 94
White hats, 96
Whitelist, 82
Whois sites, 99
Wi-Fi
components to connecting internet, 35
configuring router, 36–38
changing administrator username/password, 36–37
changing default password on Linksys router, 36f
security mode, 37–38
SSID, 37
SSID passphrase, 38
network, 12
using other people’s Wi-Fi, 38–39
security and safety, 34–41
sharing Wi-Fi with others, 39–41
setting guest network, 40–41
supporting older devices, 41
Wi-Fi Protected Access (WPA), 38
wifi, See Wi-Fi
Windows
accounts, 22–25
biometrics, 24–25
parental controls in, 206–209, 207f
Windows 8 x and 10, 48–49
Windows 10, automatic updates in, 65–67
Windows Defender, 57, 57–62, 58f
Advanced section of Settings tab, 60
History tab, 58
Rogue antivirus, 61
scheduling regular scans, 61
settings, 59f
updating, 60–61
Windows Hello feature, 24–25
Wired Encryption Protocol (WEP), 37
Wireless Security, 37–38
Work email, 76
Work-at-home scams, 146–147
Worms, 56
WPA2, 38

Y

YouTube, 117
See also Facebook, LinkedIn, Twitter
securing, 134–137
Creator Studio button, 135–137

Z

Zombie (attacker), 104
Zombie army, 104
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.71.6