
The Basics of Cyber Safety
Computer and Mobile Device Safety Made Easy
Description
Key Features
- Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use
- Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe
Readership
Nontechnical computer and mobile device users, beginning Information Security professionals, information security students. Corporate sales potential for Security Awareness training. Also useful to parents concerned about cyber safety for kids and teens online
Table of Contents
- Dedication
- About the Authors
- Acknowledgments
- Chapter 1. What is cyber safety?
- Abstract
- What Is Cyber Safety?
- Paying Attention to What’s Out There
- Privacy
- Encryption
- Monitoring Online Activity
- Identifying the Devices You Use, and Where You Use Them
- Using Different Windows Accounts
- Physical Security
- Summary
- Further Reading
- Chapter 2. Before connecting to the Internet
- Abstract
- Securing Your Web Browser
- Wi-fi Security and Safety
- Passwords
- Firewalls
- Summary
- Reference
- Chapter 3. Software problems and solutions
- Abstract
- Malware and Viruses
- Antivirus
- Windows Defender
- Antimalware
- Staying Up-To-Date
- Disaster Recovery
- Summary
- Reference
- Chapter 4. Email safety and security
- Abstract
- Email Protection
- Gmail Security
- Summary
- Chapter 5. Cybercrime
- Abstract
- What Is a Cybercriminal?
- Identity Theft
- Social Engineering
- Hacking
- Scams
- Summary
- References
- Chapter 6. Protecting yourself on social media
- Abstract
- What Is Social Media?
- Securing Social Media
- Securing Facebook
- Securing Twitter
- Securing YouTube
- Summary
- References
- Chapter 7. Finding a job online
- Abstract
- Looking for Work Online
- Online Resumes
- Work-at-Home Scams
- Securing LinkedIn
- Summary
- References
- Chapter 8. Protecting your reputation
- Abstract
- Finding Yourself
- Maintaining Privacy
- Think Twice, Post Once
- The Real World and Cyberspace
- What to Do After a Security Breach
- Digital Legacies
- Summary
- References
- Chapter 9. Beyond technology—dealing with people
- Abstract
- Netiquette
- Anonymity
- Annoying and Abusive People
- Online Chat
- Online Dating
- Meeting People in Person
- Protecting Yourself
- Summary
- References
- Chapter 10. Protecting your kids
- Abstract
- Protecting Your Kids
- Passwords for Kids
- Search Engines
- Parental Controls
- Location
- Talking About What’s Inappropriate
- Cyberbullying
- Online Predators
- Privacy
- Summary
- References
- Index
Product details
- No. of pages: 254
- Language: English
- Copyright: © Syngress 2016
- Published: August 20, 2016
- Imprint: Syngress
- Paperback ISBN: 9780124166509
- eBook ISBN: 9780124166394
About the Authors
John Sammons
John is the founder and President of the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement and information security practitioners in the private sector. He is the author of best-selling book, The Basics of Digital Forensics published by Syngress.
Affiliations and Expertise
Michael Cross
Michael Cross is a SharePoint Administrator and Developer, and has worked in the areas of software development, Web design, hardware installation/repairs, database administration, graphic design, and network administration. Working for law enforcement, he is part of an Information Technology team that provides support to over 1,000 civilian and uniformed users. His theory is that when the users carry guns, you tend to be more motivated in solving their problems.
Michael has a diverse background in technology. He was the first computer forensic analyst for a local police service, and performed digital forensic examinations on computers involved in criminal investigations. Over five years, he recovered and examined evidence involved in a wide range of crimes, inclusive to homicides, fraud, and possession of child pornography. In addition to this, he successfully tracked numerous individuals electronically, as in cases involving threatening e-mail. He has consulted and assisted in numerous cases dealing with computer-related/Internet crimes and served as an expert witness on computers for criminal trials. In 2007, he was awarded a Police Commendation for work he did in developing a system to track local high-risk offenders and sexual offenders.
With extensive experience in Web design and Internet-related technologies, Michael has created and maintained numerous Web sites and implementations of Microsoft SharePoint. This has included public Web sites, private ones on corporate intranets, and solutions that integrate them. In doing so, he has incorporated and promoted social networking features, created software to publish press releases online, and developed a wide variety of solutions that make it easier to get work done.
Michael has been a freelance writer and technical editor on over four dozen I.T. related books, as well as writing material for other genres. He previously taught as an instructor and has written courseware for IT training courses. He has also made presentations on Internet safety, SharePoint and other topics related to computers and the Internet. Despite his experience as a speaker, he still finds his wife won't listen to him.
Over the years, Michael has acquired a number of certifications from Microsoft, Novell and Comptia, including MCSE, MCP+I, CNA, Network+. When he isn’t writing or otherwise attached to a computer, he spends as much time as possible with the joys of his life: his lovely wife, Jennifer; darling daughter Sara; adorable daughter Emily; and charming son Jason.
For the latest information on him, his projects, and a variety of other topics, you can follow him on Twitter @mybinarydreams, visit his Facebook page at www.facebook.com/mybinarydreams, follow him on LinkedIn at www.linkedin.com/in/mcross1, or read his blog at http://mybinarydreams.wordpress.com.