Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Stanley Siegel, Chris Williams, Scott Donaldson
Understanding Security Issues
Cover
Title Page
Copyright
Dedication
Contents
Chapter 1: Security Mindset
What Do Hackers Want?
What Is at Stake Here?
How Has Malware Evolved?
The Security Mindset
Security Awareness
How Do Security Professionals Think about Security?
Chapter 2: Common Cybersecurity Attacks
What Are the Cyberattackers Trying to Do?
What Is the Value of Hacking You?
What Is the Value of Hacking Your Workplace?
How Do the Cyberattackers Attack?
How Can We Protect Ourselves?
Chapter 3: Protecting Your Computer(s)
Securing Your Operating System
Securing Your Applications
Using Antimalware Protection and Personal Firewall
Limiting Administrative Privileges
Controlling Your PC Camera
Backing Up Your Operating System
Watching for Signs of Compromise
Using Mac and Linux Operating Systems
Chapter 4: Protecting Your Passwords
How Do Cyberattackers Get Your Password?
Do Not Use a Bad Password
Create Good Passwords and Passphrases
Rotate Passwords Regularly
Avoid Sharing Passwords
Change Default Passwords
Safeguard Your Passwords
Understand Password Reset Mechanisms
Use Multifactor Authentication
Chapter 5: Protecting Your Home Network
Checking Your Network Modem, Router, and Firewall
Securing Your Wi-Fi Configuration
Supporting Visitors and Guests
Configuring Multimedia and Gaming Consoles
Protecting Home Internet of Things Devices and Smart Locks
Understanding Remote Access and Running Your Own Servers
Chapter 6: Smartphones and Tablets
Smartphone and Tablet Differences
Protecting Your Smartphone or Tablet
Addressing Mobile Operating System Vulnerabilities
Addressing Smartphone or Tablet “Rooting”
Reducing Smartphone or Tablet Malicious Apps Risk
Securing Bluetooth and Wi-Fi Networking
Protecting Your Smartphone and Tablet Location Privacy
Using SMS-Based Messaging and Authentication Safely
Using BYOD and Mobile Device Management
Chapter 7: Protecting Your Web Browsing
How the Web Works
Using Web Communication Protocols: HTTP versus HTTPS
Avoiding Malicious Sites, Malvertising, and Pop-Ups
Using Web Browser Security and Plug-Ins
Protecting Your Browsing History
Downloading Software Safely
Chapter 8: Protecting Your E-Mail and Phone Calls
How E-Mail Works
Preventing Unauthorized Access to Your E-Mail Account
Recognizing Malicious E-Mail
Recognizing Phishing, Spear Phishing, and Online Scams
Guarding Against Counterfeit E-Mails and Secure E-Mail
Guarding Against Unsolicited Phone Calls
Chapter 9: Protecting Your Identity, Privacy, and Family Online
Controlling Your Anonymity Online
Protecting Your Family Online
Protecting Your Identity and Credit
Safely Using E-Mail, Social Media, and Gaming
Reducing Risk of Online Shopping, Credit Cards, Banking, and Automated Teller Machines
Protecting Online Medical Privacy
Understanding Net Neutrality, HIPAA, and GDPR
Chapter 10: Protecting Yourself on Travel
Selecting What to Take When You Travel
Considering Backups and Contingencies for Travel
Using Kiosk Computers and Public Internet Connections
Considering Physical Protection, Personal Safety, and Electricity
Being Cautious about Conversations and Online Sensitive Data
Protecting Your Hard Drive and Mobile Media with Encryption
Reducing the Risk of USB Connections
Considering Diplomacy, ITAR, EAR, and Security Clearances
Chapter 11: When Things Go Wrong
Being Prepared
Recognizing Dangerous Attacks
Recognizing Account Compromise
Responding to Online Personal Attacks
Locking Down Online Accounts
Resetting Your Compromised Computer or Device
Recovering Lost Data
Reporting Work Cyber Incidents
Understanding the Risks of Being Paperless
Chapter 12: Considering Cybersecurity at Work
Enterprise Cybersecurity Differences
Enterprise Network Perimeter and Security
Endpoint Hardening and Encryption
Identity and Access Management
Web and E-Mail Protection
Remote Access to Enterprise IT Resources
Personnel Cybersecurity Training
Cybersecurity Operations and Incident Response
Physical Security and Personnel Protection
Business Continuity and Disaster Recovery
Chapter 13: Final Thoughts
Appendix A: Common Online Scams
Common Characteristics of Phishing E-Mails
Common Subject Lines for Malicious E-Mails
Watching Out for Scams and Scam Sites
Antivirus and Tech Support Scams
Internal Revenue Service (IRS) Scam
Law Enforcement Scam
Medicare and Social Security Scams
Natural Disaster and Charity Scams
Nigerian Prince Scam
Appendix B: The Worst Passwords Ever
Appendix C: Online Security Resources
Glossary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Halftitle Page
Next
Next Chapter
Copyright
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset