Normal view MARC view ISBD view

The Basics of Cyber Safety : Computer and Mobile Device Safety Made Easy.

By: Sammons, John.
Contributor(s): Cross, Michael.
Material type: TextTextSeries: eBooks on Demand.Publisher: Rockland, MA : Elsevier Science, 2015Copyright date: ©2015Description: 1 online resource (255 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9780124166394.Subject(s): Cyberspace--Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: The Basics of Cyber Safety : Computer and Mobile Device Safety Made EasyDDC classification: 005.8 Online resources: Click here to view this ebook.
Contents:
Front Cover -- The Basics of Cyber Safety -- Copyright Page -- Dedication -- Contents -- About the Authors -- Acknowledgments -- 1 What is cyber safety? -- What Is Cyber Safety? -- Why Is It Important? -- What Is the Internet? -- Keep the Faith -- Paying Attention to What's Out There -- Not All Information Is Valid -- Think Before You Click -- Reading URLs -- Faking sites with URLs -- Privacy -- Expectations and Reality -- Who Has Ownership? -- Where Are Your Files Stored? -- How Important Is Your Data? -- Once It's Out There, It's Out There -- Encryption -- Encrypting Storage -- Encrypting mobile devices -- Secure Communication on the Internet -- Monitoring Online Activity -- Monitoring Your Bank Account -- Identifying the Devices You Use, and Where You Use Them -- Separating Home and Business Computers -- Bring your own device -- Computer Use in Public Places -- Mobile Devices -- Mobile apps -- Information shared and collected by apps -- Location feature -- Smart TVs and Game Systems -- Internet of Things -- Using Different Windows Accounts -- Biometrics -- Physical Security -- Locking Down Hardware -- Summary -- Further Reading -- 2 Before connecting to the Internet -- Securing Your Web Browser -- Cookies -- Tracking Protection -- Disabling and Managing Pop-Ups -- Wi-fi Security and Safety -- A Basic Understanding of Components Used to Connect to the Internet -- Configuring Your Router -- Changing the administrator username/password -- Service set identifier -- Security mode -- SSID passphrase -- Using Other People's Wi-Fi -- Sharing Your Wi-Fi With Others -- Setting up a guest network -- Passwords -- Strong Passwords -- Changing Passwords -- Password Policies -- Setting Up Security Questions -- Remembering Passwords -- Tools -- Password generators -- Password vaults -- Passwords stored in IE -- Passwords stored in Chrome -- Google smart lock.
Firewalls -- Firewall on a Router -- Summary -- Reference -- 3 Software problems and solutions -- Malware and Viruses -- Types of Malware -- Antivirus -- Windows Defender -- Updating -- Scheduling Regular Scans -- Rogue Antivirus -- Antimalware -- Don't Forget Your Mobile -- Staying Up-To-Date -- Types of Updates -- Automatic Updates -- Updates in Windows 10 -- Windows 10 peer-to-peer updates -- Mobile Device Updates -- Other Device Updates -- Disaster Recovery -- Keeping a Copy of Passwords -- Backing Up Files -- Online backups -- Backing up phones and tablets -- Setting and Restoring Restore Points -- Summary -- Reference -- 4 Email safety and security -- Email Protection -- Limiting What Your Email Reveals -- Choosing an Email Client -- Securing Thunderbird -- Why Is It Important to Block Remote Content? -- Hiding the Message Pane -- The Dangers of an Attachment -- Free Email Sites -- Security Settings on Email Sites -- Mail.com security -- Gmail Security -- Encryption -- Summary -- 5 Cybercrime -- What Is a Cybercriminal? -- How Criminals Choose Their Targets -- Identity Theft -- Controlling the Information You Provide -- Child Identity Theft -- Social Engineering -- Technology and Social Engineering -- Suspicious Emails and SPAM -- Baiting -- Hacking -- Hijacking/Hacked Accounts -- Defaced Sites -- Common Methods -- Groups -- Inside jobs -- Low tech -- Tools -- Botnets and Rootkits -- Password cracking -- Keylogger -- Realizing Any Site Could Be Hacked -- Protecting Yourself -- Portable tools -- Scams -- Advanced Fee Scams -- Intimidation and Extortion -- Getting Something for Nothing -- Free offers and downloads -- Contests and sweepstakes -- Online Charities -- Tax Scams -- Ransomware and Scareware -- Summary -- References -- 6 Protecting yourself on social media -- What Is Social Media? -- Securing Social Media.
Using the Information You Learn on One Site to Secure Others -- Monitoring Activity -- Securing Facebook -- General -- Security -- Privacy -- Privacy shortcuts -- Know your audience -- Timeline and Tagging -- Lists -- About -- Securing Twitter -- Security -- Privacy -- Passwords -- Securing YouTube -- Creator Studio -- Community -- Channel -- Blocking and reporting -- Restricted mode -- Summary -- References -- 7 Finding a job online -- Looking for Work Online -- Fraudulent Job Posts -- Research the Company -- Social media and bogus companies -- Recruiters -- Background and Credit Checks -- Interviews -- Online Resumes -- Online Applications -- Clean Up Your Digital Presence -- Work-at-Home Scams -- Securing LinkedIn -- Two-Step Verification -- History -- Privacy Controls -- Securing Your Profile -- Summary -- References -- 8 Protecting your reputation -- Finding Yourself -- What Not to Do When Searching Yourself -- Google Alerts -- Is There a Problem? -- Other Tools -- Maintaining Privacy -- Privacy of Search -- Untag Yourself -- Private Browsing -- Delete the history, clear the cache -- Automatically clearing private data -- Tor -- Virtual private networks -- Tools -- Even Though It's Deleted, It May Not Be Deleted -- Tools -- Copies others may have -- Online storage -- Just because you don't see it, doesn't mean it's not there -- Think Twice, Post Once -- Oversharing -- The Real World and Cyberspace -- Not Everything Is Internet Based -- Telephone and mail scams -- Online "Support" -- Do not call -- Preventing mail theft -- Delivery -- Avoiding Online Records -- What to Do After a Security Breach -- Digital Legacies -- Facebook Memorial Page -- Summary -- References -- 9 Beyond technology-dealing with people -- Netiquette -- Emoticons -- Understanding the Lingo -- Anonymity -- The Effect Perceived Anonymity Has on People.
Being Wary of Others and Yourself -- The Falsehood of Anonymity -- The Flip Side of Anonymity -- Annoying and Abusive People -- Online Harassment -- Trolls and Flamers -- Creeping -- Cyberstalking -- Protecting Yourself -- Thinning the Herd -- Unfriend, unfollow, unjoin -- Blocking people -- Does losing anonymity help? -- Reporting abuse -- Online Chat -- Picking an Alias -- Instant Messaging -- Chat Rooms -- Web Cams -- Online Gaming -- Romance scams -- Online Dating -- Traditional versus Extramarital -- Sites -- Apps -- Meeting People in Person -- Protecting Yourself -- Checking Whether a Person Is Who They Say They Are -- Reviewing profiles -- Image search -- Summary -- References -- 10 Protecting your kids -- Protecting Your Kids -- Passwords for Kids -- Search Engines -- Kid-Orientated Search Engines -- Parental Controls -- Understanding What They're Using -- Parental Controls in Windows -- Filtering and blocking -- Limiting Time and the Times They're Allowed Online -- Deciding on Age Appropriate Limitations -- Location of Computer -- Location -- Lost or Stolen -- Antitheft -- Other apps and sites -- Finding a Device Finds a Person -- Finding it safely -- Report It Stolen -- Blacklists -- Remote wiping -- Resale -- Talking About What's Inappropriate -- Setting Expectations -- Conduct -- Content -- Contact -- Cyberbullying -- Calls -- Online Predators -- Privacy -- Summary -- References -- Index -- Back Cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
KF27.S266 2017 (Browse shelf) http://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=4653946 Available EBC4653946

Front Cover -- The Basics of Cyber Safety -- Copyright Page -- Dedication -- Contents -- About the Authors -- Acknowledgments -- 1 What is cyber safety? -- What Is Cyber Safety? -- Why Is It Important? -- What Is the Internet? -- Keep the Faith -- Paying Attention to What's Out There -- Not All Information Is Valid -- Think Before You Click -- Reading URLs -- Faking sites with URLs -- Privacy -- Expectations and Reality -- Who Has Ownership? -- Where Are Your Files Stored? -- How Important Is Your Data? -- Once It's Out There, It's Out There -- Encryption -- Encrypting Storage -- Encrypting mobile devices -- Secure Communication on the Internet -- Monitoring Online Activity -- Monitoring Your Bank Account -- Identifying the Devices You Use, and Where You Use Them -- Separating Home and Business Computers -- Bring your own device -- Computer Use in Public Places -- Mobile Devices -- Mobile apps -- Information shared and collected by apps -- Location feature -- Smart TVs and Game Systems -- Internet of Things -- Using Different Windows Accounts -- Biometrics -- Physical Security -- Locking Down Hardware -- Summary -- Further Reading -- 2 Before connecting to the Internet -- Securing Your Web Browser -- Cookies -- Tracking Protection -- Disabling and Managing Pop-Ups -- Wi-fi Security and Safety -- A Basic Understanding of Components Used to Connect to the Internet -- Configuring Your Router -- Changing the administrator username/password -- Service set identifier -- Security mode -- SSID passphrase -- Using Other People's Wi-Fi -- Sharing Your Wi-Fi With Others -- Setting up a guest network -- Passwords -- Strong Passwords -- Changing Passwords -- Password Policies -- Setting Up Security Questions -- Remembering Passwords -- Tools -- Password generators -- Password vaults -- Passwords stored in IE -- Passwords stored in Chrome -- Google smart lock.

Firewalls -- Firewall on a Router -- Summary -- Reference -- 3 Software problems and solutions -- Malware and Viruses -- Types of Malware -- Antivirus -- Windows Defender -- Updating -- Scheduling Regular Scans -- Rogue Antivirus -- Antimalware -- Don't Forget Your Mobile -- Staying Up-To-Date -- Types of Updates -- Automatic Updates -- Updates in Windows 10 -- Windows 10 peer-to-peer updates -- Mobile Device Updates -- Other Device Updates -- Disaster Recovery -- Keeping a Copy of Passwords -- Backing Up Files -- Online backups -- Backing up phones and tablets -- Setting and Restoring Restore Points -- Summary -- Reference -- 4 Email safety and security -- Email Protection -- Limiting What Your Email Reveals -- Choosing an Email Client -- Securing Thunderbird -- Why Is It Important to Block Remote Content? -- Hiding the Message Pane -- The Dangers of an Attachment -- Free Email Sites -- Security Settings on Email Sites -- Mail.com security -- Gmail Security -- Encryption -- Summary -- 5 Cybercrime -- What Is a Cybercriminal? -- How Criminals Choose Their Targets -- Identity Theft -- Controlling the Information You Provide -- Child Identity Theft -- Social Engineering -- Technology and Social Engineering -- Suspicious Emails and SPAM -- Baiting -- Hacking -- Hijacking/Hacked Accounts -- Defaced Sites -- Common Methods -- Groups -- Inside jobs -- Low tech -- Tools -- Botnets and Rootkits -- Password cracking -- Keylogger -- Realizing Any Site Could Be Hacked -- Protecting Yourself -- Portable tools -- Scams -- Advanced Fee Scams -- Intimidation and Extortion -- Getting Something for Nothing -- Free offers and downloads -- Contests and sweepstakes -- Online Charities -- Tax Scams -- Ransomware and Scareware -- Summary -- References -- 6 Protecting yourself on social media -- What Is Social Media? -- Securing Social Media.

Using the Information You Learn on One Site to Secure Others -- Monitoring Activity -- Securing Facebook -- General -- Security -- Privacy -- Privacy shortcuts -- Know your audience -- Timeline and Tagging -- Lists -- About -- Securing Twitter -- Security -- Privacy -- Passwords -- Securing YouTube -- Creator Studio -- Community -- Channel -- Blocking and reporting -- Restricted mode -- Summary -- References -- 7 Finding a job online -- Looking for Work Online -- Fraudulent Job Posts -- Research the Company -- Social media and bogus companies -- Recruiters -- Background and Credit Checks -- Interviews -- Online Resumes -- Online Applications -- Clean Up Your Digital Presence -- Work-at-Home Scams -- Securing LinkedIn -- Two-Step Verification -- History -- Privacy Controls -- Securing Your Profile -- Summary -- References -- 8 Protecting your reputation -- Finding Yourself -- What Not to Do When Searching Yourself -- Google Alerts -- Is There a Problem? -- Other Tools -- Maintaining Privacy -- Privacy of Search -- Untag Yourself -- Private Browsing -- Delete the history, clear the cache -- Automatically clearing private data -- Tor -- Virtual private networks -- Tools -- Even Though It's Deleted, It May Not Be Deleted -- Tools -- Copies others may have -- Online storage -- Just because you don't see it, doesn't mean it's not there -- Think Twice, Post Once -- Oversharing -- The Real World and Cyberspace -- Not Everything Is Internet Based -- Telephone and mail scams -- Online "Support" -- Do not call -- Preventing mail theft -- Delivery -- Avoiding Online Records -- What to Do After a Security Breach -- Digital Legacies -- Facebook Memorial Page -- Summary -- References -- 9 Beyond technology-dealing with people -- Netiquette -- Emoticons -- Understanding the Lingo -- Anonymity -- The Effect Perceived Anonymity Has on People.

Being Wary of Others and Yourself -- The Falsehood of Anonymity -- The Flip Side of Anonymity -- Annoying and Abusive People -- Online Harassment -- Trolls and Flamers -- Creeping -- Cyberstalking -- Protecting Yourself -- Thinning the Herd -- Unfriend, unfollow, unjoin -- Blocking people -- Does losing anonymity help? -- Reporting abuse -- Online Chat -- Picking an Alias -- Instant Messaging -- Chat Rooms -- Web Cams -- Online Gaming -- Romance scams -- Online Dating -- Traditional versus Extramarital -- Sites -- Apps -- Meeting People in Person -- Protecting Yourself -- Checking Whether a Person Is Who They Say They Are -- Reviewing profiles -- Image search -- Summary -- References -- 10 Protecting your kids -- Protecting Your Kids -- Passwords for Kids -- Search Engines -- Kid-Orientated Search Engines -- Parental Controls -- Understanding What They're Using -- Parental Controls in Windows -- Filtering and blocking -- Limiting Time and the Times They're Allowed Online -- Deciding on Age Appropriate Limitations -- Location of Computer -- Location -- Lost or Stolen -- Antitheft -- Other apps and sites -- Finding a Device Finds a Person -- Finding it safely -- Report It Stolen -- Blacklists -- Remote wiping -- Resale -- Talking About What's Inappropriate -- Setting Expectations -- Conduct -- Content -- Contact -- Cyberbullying -- Calls -- Online Predators -- Privacy -- Summary -- References -- Index -- Back Cover.

Description based on publisher supplied metadata and other sources.

There are no comments for this item.

Log in to your account to post a comment.