Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Author’s Foreword
Who Is This Book for?
You Are the Target
Best practices
Updates—OS and applications
Antivirus
Backups
Secure passwords
Computers 101
Hardware, software, firmware—what is -ware?
Hard drive types
Portable & external drives
Gigabytes and terabytes
Networking
Routers
Switches
Network adapters
Addressing
Speed
Bandwidth
VPN
Firewall
Lifespan of hardware
Cryptocurrency
Passwords and Authentication
Old to new guidelines
Password strength
Strength in length
Complexity
Exponential power in complexity
Making passwords easy to remember
Easy-to-manage passwords
Password manager
How fast can a password be cracked?
Are passwords stolen in a data breach?
Spicing up the password with “salt”
Hacked or compromised account?
Checking for a compromised account
Multi-factor authentication
Authentication factor types
Regarding security questions
Common two-factor authentication
Possible future authentication
Lip reading
The bio-factor combination
Backups
Types of backup
Backup frequency
Where are your backups?
Check backups
Recovery
My recommendation for backups
Updates and Upgrades
Operating system
Update vs. upgrade
Antivirus/anti-malware
Keep applications up-to-date
Encryption
Some encryption terms
Where can encryption be used?
Why is encryption needed?
Malware
General types
Adware
Botnet
DDoS attack
Information stealer
Ransomware
Rootkit
Trojan
Backdoor or remote access trojan
Downloader or dropper
Virus
Worm
Cryptojacking
Why isn’t software secure to begin with?
Anti-malware
If one’s good, more must be better, right?
How does malware get on the device?
Securing against malware
Social Engineering
Common social engineering techniques
Phishing
Spear phishing
Vishing
Pretexting
Baiting
Quid pro quo
Scareware
Access tailgating
Scams
Virtual kidnapping scam
Grandparent/family emergency scam
IRS scam
Jury duty scam
Romance scam
Tech support scams
“Suspended” Social Security numbers
Fraudulent online offers and sales
Sweepstakes and lotteries
Credit reports and repair
Advance fee loans
Work-at-home schemes
Other scams and complaints
Social media
Security implications
Keeping safe on social media
Limit access to work history
Anonymity—who are you really connecting with?
Take control of the comments
Social engineering defense
Secure in Your Local Network
Wired, or Ethernet
Wireless
Router/access points
Security
802 Standards
Internet of Things
Smart devices
Making regular household devices smart
The hazards of IoT
Securing TVs, network cameras, and other IoT devices
Secure in the World-
Wild
Web
Secure websites
Browser security
Cookies
Remembering passwords & other info
Log out
Internet service provider content filtering
Before you buy online
Account recovery
Phone and Mobile Security
Protecting your phone number
Securing your mobile device
Methods of authentication
Password (passphrase)
PIN
Pattern lock
Fingerprint
Facial recognition
Iris scanner
Combination
Other options to unlock the device
Spam/spoofed calls
Dealing with spoofed calls
Protecting Your Family Online
Children and the web
Web security
Monitoring
Open computing
Social media posting
Child protection registry
Young children and development
Screen time
Physical Security
Physical security at work
Badges
Verify authorization
Locks—windows and doors
Security systems
Safes
Physical security at home
What about guns?
Paperwork (Hard Copy & Digital)
Categories of paperwork
Vital records
Medical information
Estate planning documents
Financial records
Insurance policies
Property records
Digital assets
Securing paperwork
Access information for digital assets
Securing Your Identity
Free credit reports
Credit freeze
Protecting against identity fraud
Protecting minors’ credit
Watch for warning signs
Get a credit report for your child
Repair damage found
Preventing fraud
Limiting the risks of child identity theft
Reporting identity theft
What to do when a data breach happens
Data Privacy and Security
GDPR
Increased privacy coming
Disposal of devices
Don’t get comfortable
Some final words
Top Factors in Data Breaches
Top 10 incidents
Top 10 breaches
Top data compromised
Most-targeted Industries - 2018
100 of the Worst Passwords
Works Cited
Bibliography
About the Author
← Prev
Back
Next →
← Prev
Back
Next →