Security in the Digital World
Security in the Digital World
Author(s):
Graham Day
Publication Date: 28 November, 2017
Available in all formats
Series: COMPUTERS / Security / General
Publisher: IT Governance Publishing
ISBN: 9781849289610
Price: INR 1424.00
Table of contents
- Cover
- Title
- Copyright
- Dedication
- Preface
- Acknowledgements
- About the Author
- Contents
- Introduction
- Personal digital security top ten
- Chapter 1: The Internet
- 1.1 Connecting
- 1.2 Browsers
- 1.3 Browser history
- 1.4 Tabs
- 1.5 Search engine
- 1.6 McAfee WebAdvisor
- 1.7 Spam filter
- 1.8 Ad blocker
- 1.9 Cookies
- 1.10 Email
- 1.11 iCloud
- Chapter 2: The threats
- 2.1 Cyber crime
- 2.2 The who?
- 2.3 The why
- 2.4 The where
- Chapter 3: The how
- 3.1 Social engineering
- 3.2 Malware
- 3.3 Ransomware
- 3.4 Trends
- 3.5 Summary
- Chapter 4: Operating system – computers and laptops
- 4.1 MacOS
- 4.2 Windows
- Chapter 5: Home office
- 5.1 Home office and home networks
- 5.2 Computer disposal
- Chapter 6: Mobile security
- 6.1 Laptop
- 6.2 Public Wi-Fi
- 6.3 VPN
- 6.4 Public computers
- 6.5 USB devices
- 6.6 International travel
- 6.7 Summary
- Chapter 7: Smartphones and tablets
- 7.1 Apple
- 7.2 Android
- 7.3 Antivirus
- 7.4 VPN
- 7.5 USB charging points
- 7.6 Bluetooth
- 7.7 Mobile device disposal
- Chapter 8: Consumers
- 8.1 Certifications
- 8.2 Online purchasing
- 8.3 Chip and PIN cards
- 8.4 Contactless cards
- 8.5 Motioncard
- 8.6 Apple Pay and Internet of Things (IoT) payments
- 8.7 ATMs/Cashpoints
- Chapter 9: Personal and consumer rights
- 9.1 Personal information and your rights
- 9.2 Reviewing a company
- 9.3 Medical information and institutions
- 9.4 Plans and activities
- 9.5 Big data
- Chapter 10: Internet of Things (IoT)
- 10.1 Default password
- 10.2 Firewall
- 10.3 Network vulnerability management
- 10.4 Disposal of IoT devices
- 10.5 Cyber physical security
- Chapter 11: Social networking security
- 11.1 Facebook
- 11.2 LinkedIn
- 11.3 Plenty of Fish
- 11.4 Tinder
- 11.5 WhatsApp
- 11.6 Snapchat
- 11.7 Twitter
- Chapter 12: Parental security
- 12.1 Managing online security for children
- 12.2 Threats to children
- 12.3 Inappropriate content
- 12.4 Protect and manage
- Chapter 13: Resilience
- Chapter 14: Personal cyber security risk assessment
- ITG Resources
Table of contents
- Cover
- Title
- Copyright
- Dedication
- Preface
- Acknowledgements
- About the Author
- Contents
- Introduction
- Personal digital security top ten
- Chapter 1: The Internet
- 1.1 Connecting
- 1.2 Browsers
- 1.3 Browser history
- 1.4 Tabs
- 1.5 Search engine
- 1.6 McAfee WebAdvisor
- 1.7 Spam filter
- 1.8 Ad blocker
- 1.9 Cookies
- 1.10 Email
- 1.11 iCloud
- Chapter 2: The threats
- 2.1 Cyber crime
- 2.2 The who?
- 2.3 The why
- 2.4 The where
- Chapter 3: The how
- 3.1 Social engineering
- 3.2 Malware
- 3.3 Ransomware
- 3.4 Trends
- 3.5 Summary
- Chapter 4: Operating system – computers and laptops
- 4.1 MacOS
- 4.2 Windows
- Chapter 5: Home office
- 5.1 Home office and home networks
- 5.2 Computer disposal
- Chapter 6: Mobile security
- 6.1 Laptop
- 6.2 Public Wi-Fi
- 6.3 VPN
- 6.4 Public computers
- 6.5 USB devices
- 6.6 International travel
- 6.7 Summary
- Chapter 7: Smartphones and tablets
- 7.1 Apple
- 7.2 Android
- 7.3 Antivirus
- 7.4 VPN
- 7.5 USB charging points
- 7.6 Bluetooth
- 7.7 Mobile device disposal
- Chapter 8: Consumers
- 8.1 Certifications
- 8.2 Online purchasing
- 8.3 Chip and PIN cards
- 8.4 Contactless cards
- 8.5 Motioncard
- 8.6 Apple Pay and Internet of Things (IoT) payments
- 8.7 ATMs/Cashpoints
- Chapter 9: Personal and consumer rights
- 9.1 Personal information and your rights
- 9.2 Reviewing a company
- 9.3 Medical information and institutions
- 9.4 Plans and activities
- 9.5 Big data
- Chapter 10: Internet of Things (IoT)
- 10.1 Default password
- 10.2 Firewall
- 10.3 Network vulnerability management
- 10.4 Disposal of IoT devices
- 10.5 Cyber physical security
- Chapter 11: Social networking security
- 11.1 Facebook
- 11.2 LinkedIn
- 11.3 Plenty of Fish
- 11.4 Tinder
- 11.5 WhatsApp
- 11.6 Snapchat
- 11.7 Twitter
- Chapter 12: Parental security
- 12.1 Managing online security for children
- 12.2 Threats to children
- 12.3 Inappropriate content
- 12.4 Protect and manage
- Chapter 13: Resilience
- Chapter 14: Personal cyber security risk assessment
- ITG Resources