Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Author’s Foreword Who Is This Book for? You Are the Target
Best practices Updates—OS and applications Antivirus Backups Secure passwords
Computers 101
Hardware, software, firmware—what is -ware? Hard drive types Portable & external drives Gigabytes and terabytes Networking Routers Switches Network adapters Addressing Speed Bandwidth VPN Firewall Lifespan of hardware Cryptocurrency
Passwords and Authentication
Old to new guidelines Password strength Strength in length Complexity Exponential power in complexity Making passwords easy to remember Easy-to-manage passwords Password manager How fast can a password be cracked? Are passwords stolen in a data breach? Spicing up the password with “salt” Hacked or compromised account? Checking for a compromised account Multi-factor authentication Authentication factor types Regarding security questions Common two-factor authentication Possible future authentication Lip reading The bio-factor combination
Backups
Types of backup Backup frequency Where are your backups? Check backups Recovery My recommendation for backups
Updates and Upgrades
Operating system Update vs. upgrade Antivirus/anti-malware Keep applications up-to-date
Encryption
Some encryption terms Where can encryption be used? Why is encryption needed?
Malware
General types Adware Botnet DDoS attack Information stealer Ransomware Rootkit Trojan Backdoor or remote access trojan Downloader or dropper Virus Worm Cryptojacking Why isn’t software secure to begin with? Anti-malware If one’s good, more must be better, right? How does malware get on the device? Securing against malware
Social Engineering
Common social engineering techniques Phishing Spear phishing Vishing Pretexting Baiting Quid pro quo Scareware Access tailgating Scams Virtual kidnapping scam Grandparent/family emergency scam IRS scam Jury duty scam Romance scam Tech support scams “Suspended” Social Security numbers Fraudulent online offers and sales Sweepstakes and lotteries Credit reports and repair Advance fee loans Work-at-home schemes Other scams and complaints Social media Security implications Keeping safe on social media Limit access to work history Anonymity—who are you really connecting with? Take control of the comments Social engineering defense
Secure in Your Local Network
Wired, or Ethernet Wireless Router/access points Security 802 Standards
Internet of Things
Smart devices Making regular household devices smart The hazards of IoT Securing TVs, network cameras, and other IoT devices
Secure in the World- Wild Web
Secure websites Browser security Cookies Remembering passwords & other info Log out Internet service provider content filtering Before you buy online Account recovery
Phone and Mobile Security
Protecting your phone number Securing your mobile device Methods of authentication Password (passphrase) PIN Pattern lock Fingerprint Facial recognition Iris scanner Combination Other options to unlock the device Spam/spoofed calls Dealing with spoofed calls
Protecting Your Family Online
Children and the web Web security Monitoring Open computing Social media posting Child protection registry Young children and development Screen time
Physical Security
Physical security at work Badges Verify authorization Locks—windows and doors Security systems Safes Physical security at home What about guns?
Paperwork (Hard Copy & Digital)
Categories of paperwork Vital records Medical information Estate planning documents Financial records Insurance policies Property records Digital assets Securing paperwork Access information for digital assets
Securing Your Identity
Free credit reports Credit freeze Protecting against identity fraud Protecting minors’ credit Watch for warning signs Get a credit report for your child Repair damage found Preventing fraud Limiting the risks of child identity theft Reporting identity theft What to do when a data breach happens
Data Privacy and Security
GDPR Increased privacy coming Disposal of devices Don’t get comfortable Some final words
Top Factors in Data Breaches
Top 10 incidents Top 10 breaches Top data compromised
Most-targeted Industries - 2018 100 of the Worst Passwords Works Cited Bibliography About the Author
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion