Security in the Digital World  
Author(s): Graham Day
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781849289610
Pages: 226

PAPERBACK

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849289610 Price: INR 1424.00
Add to cart Buy Now
  • Cover
  • Title
  • Copyright
  • Dedication
  • Preface
  • Acknowledgements
  • About the Author
  • Contents
  • Introduction
  • Personal digital security top ten
  • Chapter 1: The Internet
    • 1.1 Connecting
    • 1.2 Browsers
    • 1.3 Browser history
    • 1.4 Tabs
    • 1.5 Search engine
    • 1.6 McAfee WebAdvisor
    • 1.7 Spam filter
    • 1.8 Ad blocker
    • 1.9 Cookies
    • 1.10 Email
    • 1.11 iCloud
  • Chapter 2: The threats
    • 2.1 Cyber crime
    • 2.2 The who?
    • 2.3 The why
    • 2.4 The where
  • Chapter 3: The how
    • 3.1 Social engineering
    • 3.2 Malware
    • 3.3 Ransomware
    • 3.4 Trends
    • 3.5 Summary
  • Chapter 4: Operating system – computers and laptops
    • 4.1 MacOS
    • 4.2 Windows
  • Chapter 5: Home office
    • 5.1 Home office and home networks
    • 5.2 Computer disposal
  • Chapter 6: Mobile security
    • 6.1 Laptop
    • 6.2 Public Wi-Fi
    • 6.3 VPN
    • 6.4 Public computers
    • 6.5 USB devices
    • 6.6 International travel
    • 6.7 Summary
  • Chapter 7: Smartphones and tablets
    • 7.1 Apple
    • 7.2 Android
    • 7.3 Antivirus
    • 7.4 VPN
    • 7.5 USB charging points
    • 7.6 Bluetooth
    • 7.7 Mobile device disposal
  • Chapter 8: Consumers
    • 8.1 Certifications
    • 8.2 Online purchasing
    • 8.3 Chip and PIN cards
    • 8.4 Contactless cards
    • 8.5 Motioncard
    • 8.6 Apple Pay and Internet of Things (IoT) payments
    • 8.7 ATMs/Cashpoints
  • Chapter 9: Personal and consumer rights
    • 9.1 Personal information and your rights
    • 9.2 Reviewing a company
    • 9.3 Medical information and institutions
    • 9.4 Plans and activities
    • 9.5 Big data
  • Chapter 10: Internet of Things (IoT)
    • 10.1 Default password
    • 10.2 Firewall
    • 10.3 Network vulnerability management
    • 10.4 Disposal of IoT devices
    • 10.5 Cyber physical security
  • Chapter 11: Social networking security
    • 11.1 Facebook
    • 11.2 LinkedIn
    • 11.3 Plenty of Fish
    • 11.4 Tinder
    • 11.5 WhatsApp
    • 11.6 Snapchat
    • 11.7 Twitter
  • Chapter 12: Parental security
    • 12.1 Managing online security for children
    • 12.2 Threats to children
    • 12.3 Inappropriate content
    • 12.4 Protect and manage
  • Chapter 13: Resilience
  • Chapter 14: Personal cyber security risk assessment
  • ITG Resources
Rating
Table of contents
  • Cover
  • Title
  • Copyright
  • Dedication
  • Preface
  • Acknowledgements
  • About the Author
  • Contents
  • Introduction
  • Personal digital security top ten
  • Chapter 1: The Internet
    • 1.1 Connecting
    • 1.2 Browsers
    • 1.3 Browser history
    • 1.4 Tabs
    • 1.5 Search engine
    • 1.6 McAfee WebAdvisor
    • 1.7 Spam filter
    • 1.8 Ad blocker
    • 1.9 Cookies
    • 1.10 Email
    • 1.11 iCloud
  • Chapter 2: The threats
    • 2.1 Cyber crime
    • 2.2 The who?
    • 2.3 The why
    • 2.4 The where
  • Chapter 3: The how
    • 3.1 Social engineering
    • 3.2 Malware
    • 3.3 Ransomware
    • 3.4 Trends
    • 3.5 Summary
  • Chapter 4: Operating system – computers and laptops
    • 4.1 MacOS
    • 4.2 Windows
  • Chapter 5: Home office
    • 5.1 Home office and home networks
    • 5.2 Computer disposal
  • Chapter 6: Mobile security
    • 6.1 Laptop
    • 6.2 Public Wi-Fi
    • 6.3 VPN
    • 6.4 Public computers
    • 6.5 USB devices
    • 6.6 International travel
    • 6.7 Summary
  • Chapter 7: Smartphones and tablets
    • 7.1 Apple
    • 7.2 Android
    • 7.3 Antivirus
    • 7.4 VPN
    • 7.5 USB charging points
    • 7.6 Bluetooth
    • 7.7 Mobile device disposal
  • Chapter 8: Consumers
    • 8.1 Certifications
    • 8.2 Online purchasing
    • 8.3 Chip and PIN cards
    • 8.4 Contactless cards
    • 8.5 Motioncard
    • 8.6 Apple Pay and Internet of Things (IoT) payments
    • 8.7 ATMs/Cashpoints
  • Chapter 9: Personal and consumer rights
    • 9.1 Personal information and your rights
    • 9.2 Reviewing a company
    • 9.3 Medical information and institutions
    • 9.4 Plans and activities
    • 9.5 Big data
  • Chapter 10: Internet of Things (IoT)
    • 10.1 Default password
    • 10.2 Firewall
    • 10.3 Network vulnerability management
    • 10.4 Disposal of IoT devices
    • 10.5 Cyber physical security
  • Chapter 11: Social networking security
    • 11.1 Facebook
    • 11.2 LinkedIn
    • 11.3 Plenty of Fish
    • 11.4 Tinder
    • 11.5 WhatsApp
    • 11.6 Snapchat
    • 11.7 Twitter
  • Chapter 12: Parental security
    • 12.1 Managing online security for children
    • 12.2 Threats to children
    • 12.3 Inappropriate content
    • 12.4 Protect and manage
  • Chapter 13: Resilience
  • Chapter 14: Personal cyber security risk assessment
  • ITG Resources
User Reviews
Rating