Hack Proofing Your Identity In The Information Age

By

  • . Syngress

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.
View full description

 

Book information

  • Published: July 2002
  • Imprint: SYNGRESS
  • ISBN: 978-1-931836-51-7


Table of Contents


Foreword

Chapter 1 Identity Theft: Are You At Risk

Introduction

Defining Identity Theft

Take a Risk Factor Test

Why Do They Do It

How Do They Get Away with It

Recognizing Identity Theft When It Happens

Understanding What Electronic Information Is Private

Striving for Theft Prevention

Keeping Private Information Private

Protecting Your Social Security Number

Taking Advantage of Marketing Opt-Out Programs

Protecting Your Computer

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 2 Protecting Your Hard Drive

Introduction

Know Your Computer

Temporary Files

Temporary Internet Files

Deleting Files Permanently for Privacy

Other Information that Might be on Your Computer

What Are You Protecting

Antivirus Software:Your First Line of Defense

What You Might Not Know about Antivirus Software

What Kinds of Software Are Available

Performing Signature Updates

Is Your Antivirus Software Working

Updating Your Software

The Number One Mistake People Make

Functionality Vs. Secure Updates

Installing Security Patches

Beware of the Free Stuff

Avoiding Account Sharing

Common Reasons, Risks, and Deterrents for Sharing Accounts

Creating Multiple Accounts in Windows

Creating Multiple Internet Connection Accounts

Creating Multiple E-mail Accounts with Outlook Express

Using Disk and File Encryption

Choosing Strong Passwords

Avoiding Weak Passwords

Tradeoffs: Using Password Storage

Creating Strong Passwords You Can Remember

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 3 Keeping Your E-mail Private

Introduction

E-mail Privacy Is Not Just about Spam

How E-mail Services Work

Big Brother and Your E-mail

How E-mails Can Get Lost

Understanding Spam

E-mail Attacks Are Not Just about Viruses

E-mail Attachments

How Your E-mail Can Be Hijacked

E-mail Interceptions

Recognizing Mail Scams

Solicitations and Chain Letters

Spam as Social Engineering

Using Antivirus Protection for E-mail

Hiding Your E-mail Identity

Knowing What’s in Your E-mail Headers

Knowing What Your Chat Says about You

Setting Up Anonymous E-mail

E-mail Encryption Made Simple

Using Pretty Good Privacy (PGP) with Microsoft Outlook

Using Personal Certificates with Netscape

Verifying E-mail Senders in Outlook

Importing a Personal Certificate File into Opera

Choosing a Secure E-mail Provider

Using Encrypted Web-based E-mail

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 4 Self Defense on the Web

Introduction

Understanding Risk on the Web

Learning to Be Street Smart on the Web

Understanding the Privacy Policy

Managing Risk on the Web

Managing Passwords

Protecting Your Purchasing Power

Anonymous Web Surfing

Improving Browser Safety

Updating Your Browser Software

Putting Browser Security Features to Work

Covering Your Internet Footprints

Deleting Hidden Information About You

Opting Out of Ad-ware Cookies

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 5 Connecting to the Internet Safely

Introduction

Different Connections, Different Risks

Understanding Network Terminology

Dial-up Connections

Always-on Broadband

Understanding Data Interception

Taking Precautions

Setting Permissions for Shared Drives and Files

Registering Your Domain.com

Turning Off Unneeded Services

Securing Your Personal Web Server

Firewalls for the Home

Personal Firewalls for Home Office Use

Network Firewalls for Home Office Use

Using Common Firewall Configuration Features

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 6 Are Your Kids Putting You at Risk

Introduction

Raising Children in the Digital Age

Keeping Clear Online Identities within Families

Supervising Online Activities

Channeling a Child’s Interest in Hacking

Identifying Risky Software and Risky Behavior

Chat Programs

Web Forums and Newsgroups

Massive Multiplayer Online Games

File-Sharing Software

Hacking Tools

Monitoring Online Activities

Parental Contracts

Application Logging

Browser Activity Logging

Keystroke Logging

Screen Imaging

Avoiding Monitoring Pitfalls

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 7 If You Become a Victim

Introduction

Taking Immediate Action

Step 1: Filing Police Reports

Step 2: Reporting Fraud and Stolen Accounts

Step 3: Notifying the Federal Trade Commission (FTC)

Managing Other Fraud Situations

Managing the Fallout

Contacting Credit Bureau Services

Knowing When to Seek Legal Help

Keeping Records

Locating Government Resources

Statutes in Your State

Federal Trade Commission

Other Suggested Resources

Privacy Rights Advocates

Summary

Solutions Fast Track

Frequently Asked Questions

Chapter 8 Configuring Your Browser and Firewall

Introduction

Managing Your Web Browser’s Security Features

Internet Explorer Version 6

Netscape 6.2

Opera 6

Configuring Your Home Firewall

BlackICE Defender for Windows

Zone Alarm Pro for Windows

Siemens Speedstream SS2602 DSL/Cable Router

Applications Port List

Index