The basics of cyber safety computer and mobile device safety made easy
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons,...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Cambridge, MA :
Syngress
[2017]
|
Edition: | 1st edition |
Series: | Gale eBooks
|
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629898606719 |
Table of Contents:
- Front Cover; The Basics of Cyber Safety; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; 1 What is cyber safety?; What Is Cyber Safety?; Why Is It Important?; What Is the Internet?; Keep the Faith; Paying Attention to What's Out There; Not All Information Is Valid; Think Before You Click; Reading URLs; Faking sites with URLs; Privacy; Expectations and Reality; Who Has Ownership?; Where Are Your Files Stored?; How Important Is Your Data?; Once It's Out There, It's Out There; Encryption; Encrypting Storage; Encrypting mobile devices
- Secure Communication on the InternetMonitoring Online Activity; Monitoring Your Bank Account; Identifying the Devices You Use, and Where You Use Them; Separating Home and Business Computers; Bring your own device; Computer Use in Public Places; Mobile Devices; Mobile apps; Information shared and collected by apps; Location feature; Smart TVs and Game Systems; Internet of Things; Using Different Windows Accounts; Biometrics; Physical Security; Locking Down Hardware; Summary; Further Reading; 2 Before connecting to the Internet; Securing Your Web Browser; Cookies; Tracking Protection
- Disabling and Managing Pop-UpsWi-fi Security and Safety; A Basic Understanding of Components Used to Connect to the Internet; Configuring Your Router; Changing the administrator username/password; Service set identifier; Security mode; SSID passphrase; Using Other People's Wi-Fi; Sharing Your Wi-Fi With Others; Setting up a guest network; Passwords; Strong Passwords; Changing Passwords; Password Policies; Setting Up Security Questions; Remembering Passwords; Tools; Password generators; Password vaults; Passwords stored in IE; Passwords stored in Chrome; Google smart lock; Firewalls
- Firewall on a RouterSummary; Reference; 3 Software problems and solutions; Malware and Viruses; Types of Malware; Antivirus; Windows Defender; Updating; Scheduling Regular Scans; Rogue Antivirus; Antimalware; Don't Forget Your Mobile; Staying Up-To-Date; Types of Updates; Automatic Updates; Updates in Windows 10; Windows 10 peer-to-peer updates; Mobile Device Updates; Other Device Updates; Disaster Recovery; Keeping a Copy of Passwords; Backing Up Files; Online backups; Backing up phones and tablets; Setting and Restoring Restore Points; Summary; Reference; 4 Email safety and security
- Email ProtectionLimiting What Your Email Reveals; Choosing an Email Client; Securing Thunderbird; Why Is It Important to Block Remote Content?; Hiding the Message Pane; The Dangers of an Attachment; Free Email Sites; Security Settings on Email Sites; Mail.com security; Gmail Security; Encryption; Summary; 5 Cybercrime; What Is a Cybercriminal?; How Criminals Choose Their Targets; Identity Theft; Controlling the Information You Provide; Child Identity Theft; Social Engineering; Technology and Social Engineering; Suspicious Emails and SPAM; Baiting; Hacking; Hijacking/Hacked Accounts
- Defaced Sites