كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy
منتدى هندسة الإنتاج والتصميم الميكانيكى
بسم الله الرحمن الرحيم

أهلا وسهلاً بك زائرنا الكريم
نتمنى أن تقضوا معنا أفضل الأوقات
وتسعدونا بالأراء والمساهمات
إذا كنت أحد أعضائنا يرجى تسجيل الدخول
أو وإذا كانت هذة زيارتك الأولى للمنتدى فنتشرف بإنضمامك لأسرتنا
وهذا شرح لطريقة التسجيل فى المنتدى بالفيديو :
http://www.eng2010.yoo7.com/t5785-topic
وشرح لطريقة التنزيل من المنتدى بالفيديو:
http://www.eng2010.yoo7.com/t2065-topic
إذا واجهتك مشاكل فى التسجيل أو تفعيل حسابك
وإذا نسيت بيانات الدخول للمنتدى
يرجى مراسلتنا على البريد الإلكترونى التالى :

Deabs2010@yahoo.com


-----------------------------------
-Warning-

This website uses cookies
We inform you that this site uses own, technical and third parties cookies to make sure our web page is user-friendly and to guarantee a high functionality of the webpage.
By continuing to browse this website, you declare to accept the use of cookies.
منتدى هندسة الإنتاج والتصميم الميكانيكى
بسم الله الرحمن الرحيم

أهلا وسهلاً بك زائرنا الكريم
نتمنى أن تقضوا معنا أفضل الأوقات
وتسعدونا بالأراء والمساهمات
إذا كنت أحد أعضائنا يرجى تسجيل الدخول
أو وإذا كانت هذة زيارتك الأولى للمنتدى فنتشرف بإنضمامك لأسرتنا
وهذا شرح لطريقة التسجيل فى المنتدى بالفيديو :
http://www.eng2010.yoo7.com/t5785-topic
وشرح لطريقة التنزيل من المنتدى بالفيديو:
http://www.eng2010.yoo7.com/t2065-topic
إذا واجهتك مشاكل فى التسجيل أو تفعيل حسابك
وإذا نسيت بيانات الدخول للمنتدى
يرجى مراسلتنا على البريد الإلكترونى التالى :

Deabs2010@yahoo.com


-----------------------------------
-Warning-

This website uses cookies
We inform you that this site uses own, technical and third parties cookies to make sure our web page is user-friendly and to guarantee a high functionality of the webpage.
By continuing to browse this website, you declare to accept the use of cookies.



 
الرئيسيةالبوابةأحدث الصورالتسجيلدخولحملة فيد واستفيدجروب المنتدى

شاطر
 

 كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy

اذهب الى الأسفل 
كاتب الموضوعرسالة
Admin
مدير المنتدى
مدير المنتدى
Admin

عدد المساهمات : 19001
التقييم : 35505
تاريخ التسجيل : 01/07/2009
الدولة : مصر
العمل : مدير منتدى هندسة الإنتاج والتصميم الميكانيكى

كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy Empty
مُساهمةموضوع: كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy   كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy Emptyالسبت 3 فبراير 2024 - 23:17

أخواني في الله
أحضرت لكم كتاب
The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy
John Sammons, Michael Cross

كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy T_b_o_14
و المحتوى كما يلي :

What is cyber safety? 1
CHAPTER
INFORMATION IN THIS CHAPTER
● What Is Cyber Safety?
● Paying Attention to What’s Out There
● Privacy
● Encryption
● Monitoring Online Activity
● Identifying the Devices You Use, and Where You Use Them
● Using Different Windows Accounts
● Physical Security
e connecting to the
Internet 2
CHAPTER
INFORMATION IN THIS CHAPTER
● Securing Your Web Browser
● Wi-Fi Security and Safety
● Passwords
● Firewalls
● Physical Security
● Identifying the Devices You Use, and Where You Use Them
are problems and
solutions 3
CHAPTER
INFORMATION IN THIS CHAPTER
● Malware and Viruses
● Antivirus
● Antimalware
● Staying Up-To-Date
● Disaster Recovery
Email safety and security 4
CHAPTER
INFORMATION IN THIS CHAPTER
● Email Protection
● Limiting What Your Email Reveals
● Choosing an Email Client
● Free Email Sites
● Security Settings on Email Sites
Cybercrime 5
CHAPTER
INFORMATION IN THIS CHAPTER
● What Is a Cybercriminal?
● Identity Theft
● Social Engineering
● Hacking
● Scams
social media 6
CHAPTER
INFORMATION IN THIS CHAPTER
● What Is Social Media?
● Securing Social Media
● Securing Facebook
● Securing Twitter
● Securing YouTube
Finding a job online 7
CHAPTER
INFORMATION IN THIS CHAPTER
● Looking for Work Online
● Online Resumes
● Work-at-Home Scams
● Securing LinkedIn
Protecting your reputation 8
CHAPTER
INFORMATION IN THIS CHAPTER
● Think Twice, Post Once
● The Real World and Cyberspace
● What to Do After a Security Breach
● Digital Legacies
Beyond technology—dealing
with people 9
CHAPTER
INFORMATION IN THIS CHAPTER
● Netiquette
● Anonymity
● Annoying and Abusive People
● Online Chat
● Online Dating
● Meeting People in Person
● Protecting Yourself
● Creating a New Identity
Protecting your kids 10
CHAPTER
INFORMATION IN THIS CHAPTER
● Protecting Your Kids
● Filtering and Blocking
● Parental Controls
● Browsers for Kids
● Kid-Orientated Search Engines
● Limiting Time and the Times They’re Allowed Online
● Location
● Talking About What’s Inappropriate
● Cyberbulling
● Online Predators
● Privacy Settings
● Monitoring Online Activity
Index
Note: Page numbers followed by “b” and “f” refer to boxes and figures, respectively.
A
About section of profile, 130–131
Abusive people, 184–192
blocking people, 189–190
creeping, 186–187
cyberstalking, 187
losing anonymity, 190–191
online harassment, 185
preventative measures, 187–188
reporting abuse, 190–191
thinning herd, 188
trolls and flamers, 186
unfriend, unfollow, unjoin, 188–189
Activity Log, 119–120
Ad-aware, 62
Administrator account, 23
Advanced Encryption Standard (AES), 38
Advertising-supported software (Adware), 54
AES. See Advanced Encryption Standard (AES)
Alias, 77, 99, 192–193
Annoying people, 184–192
blocking people, 189–190
creeping, 186–187
cyberstalking, 187
losing anonymity, 190–191
online harassment, 185
preventative measures, 187–188
reporting abuse, 190–191
thinning herd, 188
trolls and flamers, 186
unfriend, unfollow, unjoin, 188–189
Anonymity, 77, 181–184
being wary of others and yourself, 182–183
falsehood, 183
flip side, 183–184
losing, 190–191
Antimalware, 40, 62–63, 108–109, 114
Antitheft software, 210–213
apps and sites, 212
Antivirus, 56–57
App Passwords section, 124
AppBugs, 104–105
Apple Cloud services, 11
Apple Mail, 77
Asymmetric cryptography, 12
Attachment, 75
dangers, 80–81
AutoComplete, 48
Automated Filters settings, 136
Automatic updates, 64–68
Windows 10 peer-to-peer updates, 67–68
in Windows 10, 65–67
Avast antivirus, 57
AVG antivirus, 56
B
Backdoors, 54–55
Backing up files, 70–73
backing up phones and tablets, 72–73
online backups, 71–72
Baiting, 95–96
Bank account, monitoring, 16
Biometrics, 24–25
BitLocker, 13
BitTorrent technology, 183
Black hats, 96
Blackberry Blend program, 73
Blackberry devices, 73
Blacklist section, 83, 136
Blocking, 207–209, 208f
people, 189–190, 189f
Bogus companies, 142
Bookmarking, 117
Botnets, 55
tools, 104–105
Bots, 104
Bots. See Robots (Bots)
Bring Your Own Device (BYOD), 17
Browser hijackers, 55
Bulletin Board Systems, 180
Business computers, 16–22
BYOD. See Bring Your Own Device (BYOD)
C
Cache clearance, 160–161
CCleaner, 163, 164f
Changing passwords, 42
Channel link, 136–137
Chat rooms, 193–194
Chatiquette, 193–194230 Index
Checkpoint. See Restore point
Child identity theft, 90–91
Child’s safety, 210
ChildScan service, 91
Cipher tool, 163–164
Ciphertext, 12
Click jacking method, 100–101
Client authentication, 14
Clone phishing, 94
Cloud storage. See Online storage
Cloud, 2
services, 165–166
Code generator, 123–124
Comments and Ratings section, 137
Communication, 192
methods, 185
online, 192
online chat, 192–196
security on Internet, 192–196
Community link, 135–136
Cookies, 30–32
tracking, 7, 30–31, 55–56
Copycat site, 94
Cracker, 96
Cracking passwords, 42
Creator Studio, 135–137
blocking and reporting, 137
channel link, 136–137
community link, 135–136
restricted mode, 137
Creeping, 186–187
Critical updates, 64
Cumulative update, 63
Cyber safety, 1, 76, 95. See also Cybercrime
device identification, 16–22
computer use in public places, 18
Internet of Things, 22
mobile devices, 18–20
separating home and business computers, 16–22
smart TVs and game systems, 21–22
encryption, 12–15
Internet, 2–3
Internet privacy, 7–12
data importance, 10
expectations and reality, 7–8
files storage, 10
information importance, 11–12
ownership, 8–9
issues, 3
monitoring online activity, 15–16
paying attention, 3–7
reading URLs, 4–7
thinking before clicking, 4
validating information, 3–4
physical security, 25–26
in physical world, 1–2
using Windows accounts, 22–25
biometrics, 24–25
Cyberbullying, 221–223
prank calls, 222–223
Cybercrime, 87–88. See also Cyber safety
cybercriminal, 87–88
criminals choosing targets, 88
hacking, 96–109
common methods, 99–103
defaced sites, 99
hijacking/hacked accounts, 97–98
tools, 103
ransomware, 114
scams, 109–115
advanced fee scams, 109
intimidation and extortion, 110
offers on Internet, 110–112
online charities, 112–113
tax scams, 113
scareware, 114
social engineering, 91–96
baiting, 95–96
suspicious emails and SPAM, 94–95
technology and, 93–94
theft identification, 88–91
child identity theft, 90–91
controlling provides information, 89–90
Cybercriminals, 5–6, 105, 170
criminals choosing targets, 88
Cybersafety, 168–169
Cyberspace, 168–174
Internet-based issues, 169–172
Do Not Call registry, 171
online “support”, 171
preventing mail theft, 172
telephone and mail scams, 170
Cyberstalking, 187
D
Data deletion, 163–167
account activation and deactivation, 167
data sharing, 165
online storage, 165–166
tools, 163–165
Data encryption, 15
Data sharing, 165
Decryption, 86
Defaced sites, 99Index 231
Default Settings section, 136
Defer upgrades option, 66
Device activity & notifications link, 84–85
Device history section, 121
Digital legacies, 176–177
Facebook memorial page, 177
Disaster recovery, 69–74
backing up files, 70–73
backing up phones and tablets, 72–73
online backups, 71–72
copy of passwords, 70
setting and restoring restore points, 73–74
Discoverability setting, 133
Distributed Denial of Service attack, 104
Do Not Call Registry, 171
Domain name, 5
Dox, 101
Doxing, 101
Dumpster diving, 103, 169
E
Egosurfing, 153
Email, 75, 120, 122
email settings, 82
email sites, security settings on, 81–83
Email protection, 76–83
email client selection, 77–79
block remote content, 79–80
dangers of attachment, 80–81
hiding message pane, 80
securing Thunderbird, 77–79
limiting email reveals, 76–77
nonidentifying email, 77b
Email safety and security
email protection, 76–83
choosing email client, 77–79
limiting email reveals, 76–77
nonidentifying Email, 77b
free email sites, 81
Gmail security, 83–86
checking Gmail security and privacy, 85b
encryption, 85–86
Other Google Account settings link, 84
password recovery features, 83–84
ISP, 75
security settings on email sites, 81–83
Mail. com security, 82–83
Encryption, 12–15, 85–86
encrypting storage, 13–14
encrypting mobile devices, 14
secure communication on Internet, 14–15
site using HTTPS, 15f
Equifax service, 91
Ethernet, 35
Experian service, 91
Exploits, 55
Extramarital dating sites, 196–197
F
Facebook, 3, 98, 101, 118–120, 177. See also
Twitter; LinkedIn; YouTube
memorial page, 177
securing, 121–131
General settings page, 122–123
lists, 129–130
Privacy settings and tools page, 125–128
About section, 130–131
Security settings page, 123–125
Timeline and Tagging settings, 128–129, 128f
Facial recognition feature, 24–25
Faking sites with URLs, 5–7
Family Secure service, 91
Federal Trade Commission (FTC), 89
File Transfer Protocol (FTP), 5
Filter Anonymous Internet Requests, 52
Filter Internet NAT Redirection, 52
Filter Multicast, 52
Filtering, 207–209
Finding job online
background and credit checks, 143
fraudulent job posts, 140–141
Internet, 141
interviews, 143–144
job search sites, 139–140
online resumes, 144–146
clean up our digital presence, 145–146
online applications, 145
professional social networks, 140
recruiters, 142–143
researching company, 141–142
bogus companies, 142
social media, 142
securing LinkedIn, 147–151
work-at-home scams, 146–147
Fingerprint readers, 24
Firewalls, 50–52. See also Encryption
Linksys firewall, 51f
on router, 50–52
Firmware, 21–22
Flamebait, 186
Flamers, 186
Forgot Password link, 90
Forums and blog comments, 117
Fraudulent job posts, 140–141232 Index
Free email sites, 81
Freeware, 54
FTC. See Federal Trade Commission (FTC)
FTP. See File Transfer Protocol (FTP)
G
General settings page, 122–123
Generic account, 76
Gmail, 75, 81
security, 83–86
checking Gmail security and privacy, 85b
encryption, 85–86
Google Account settings, 84
password recovery features, 83–84
Google, 3
Google Smart Lock, 49–50
Other Google Account settings link, 84
Google mail. See Gmail
Graphical user interface (GUI), 29
Gray hats, 96
Guest account, 23
Guest network, setting up, 40–41
GUI. See Graphical user interface (GUI)
H
Hackers, 2, 10–11, 37, 39, 88, 96–97, 99, 103, 156
Hacking, 96–109
common methods, 99–103
groups, 101–102
inside jobs, 102
low tech method, 102–103
defaced sites, 99
hijacking/hacked accounts, 97–98
tools, 103
botnets and rootkits tools, 104–105
keylogger tool, 105
password cracking tool, 104–105
portable tools, 108–109
protection, 107–109
realizing sites, 105–107
Hacktivists, 97
Hashing, 12
hashtag, 132
Headhunters, 142
Hijacking, 98
Hijacking/hacked accounts, 97–98
History deletion, 160–161
Home computers, 16–22
Hotmail, 81
HTTP. See Hypertext Transfer Protocol (HTTP)
HTTPS, 15, 15f, 108
Hyperlinks, 4
Hypertext Transfer Protocol (HTTP), 5, 15
I
IC3. See Internet Crime Complaint Center (IC3)
iCloud, 73
Identity theft, 88–91
child identity theft, 90–91
controlling provides information, 89–90
IE. See Internet Explorer (IE)
IM. See Instant Messaging (IM)
Image search, 199–200
IMEI. See International Mobile Equipment Identity
(IMEI)
Inbox, 75
Infoencrypt, 85
InfoSecurity Europe, 92
Instant Messaging (IM), 193
Integrity checks, 15
Internal recruiters, 142
Internal Revenue Service (IRS), 92
International Mobile Equipment Identity (IMEI), 215
Internet, 2–3, 35, 141, 146, 153, 180, 202
before connecting
firewalls, 50–52
passwords, 41–50
securing Web browser, 29–34
Wi-Fi security and safety, 34–41
jargon, 181
secure communication, 14–15
social media site, 119
of Things, 22
Internet Crime Complaint Center (IC3), 87–88
Internet Explorer (IE), 29
Internet Explorer 8, 108
Internet privacy, 7–12
data importance, 10
expectations and reality, 7–8
files storage, 10
information importance, 11–12
ownership, 8–9
Internet Service Provider (ISP), 34, 57, 75, 93, 181
Interviews, 143–144
iOS device, 166
IP address, 5, 80, 183
IRS. See Internal Revenue Service (IRS)
ISP. See Internet Service Provider (ISP)
K
Keylogger tool, 105
L
Likejacking, 101
LinkedIn, 140. See also Facebook; Twitter;
YouTubeIndex 233
securing, 147–151
history, 148
privacy controls, 148–150, 149f
securing our profile, 150–151
two-step verification, 147–148
Linksys
firewall, 51f
router, 38, 40, 50
changing default password on, 36f
Lists, 129–130
Local Security Policy, 43f
Location controls, 133
Login Approvals feature, 124
Login history section, 121
Login verification checkbox, 132
M
Mail server, 75
Mailbox, 75
Malicious software (Malware), 53–56, 79
Malware. See Malicious software (Malware)
Malwarebytes Anti-Malware, 62
Malwarebytes Anti-Malware Mobile, 19–20
Malwarebytes app manager, 20f
Malwarebytes privacy manager, 21f
McAffee, 57
Media sharing, 117
Metadata, 158
Microblogging, 117
Microsoft, 62
account, 23–24
Microsoft Outlook, 75, 77, 81
operating systems, 63–64
Mobile apps, 19, 63–64
Mobile device encryption, 14
Mobile devices, 18–20
information sharing and collection by apps, 19–20
location features, 20–21
Malwarebytes
app manager, 20f
privacy manager, 21f
Mobile apps, 19
updates, 68–69
Modem, 35
Moderators, 193–194
Monitoring activity, 119–121
N
National identity number, 144
National Security Agency (NSA), 8
Netiquette (Network etiquette), 179–181
emoticons, 179–181
Lingo, 181
Network, 35
Network etiquette. See Netiquette
(Network etiquette)
“Nigerian 419 scam”, 109
NoScripting, 108
NSA. See National Security Agency (NSA)
O
Offsite storage, 72
Online backups, 71–72
Online chat, 192–196
alias, 192–193
chat rooms, 193–194
IM, 193
online games, 195–196
Web cams, 194–195
Online communication, 208
Online dating, 196–198
apps, 197–198
sites, 197
traditional vs. extramarital, 196–197
Online games, 195–196
romance scams, 195
Online harassment, 185
sexual harassment, 187
Online predators, 223–225
Online reputation protection
digital legacies, 176–177
Facebook memorial page, 177
finding yourself in Internet, 153–156
Google alerts, 155, 155f
problems in searching, 156
restriction, 154–155
tools, 156
precaution to post personals, 167–168
oversharing, 168
privacy maintenance, 156–167
deleting and retrieving data, 163–167
privacy of search, 157–158
private browsing, 158–163
untag yourself, 158
real world and cyberspace, 168–174
security breach, 174–176
Online resumes, 144–146
clean up our digital presence, 145–146
online applications, 145
Online storage, 165–166
Online surveys, 7
P
P2P method. See Peer-to-peer method (P2P
method)
Panda, 57234 Index
Parental controls, 204–210, 205f
deciding on age appropriate limitations, 210
filtering and blocking, 207–209, 208f
location of computer, 210
time limits, 209–210
understanding kids activities, 205
in Windows, 206–209, 207f
Passphrases, 37, 41
Password managers. See Password—vaults
Passwords, 36, 41–50, 134. See also Encryption
changing, 42
cracking, 42
tool, 104–105
generators, 46
Local Security Policy, 43f
Password section, 123
policies, 42–44
remembering passwords, 45–46
setting security questions, 44–45
storing
in Chrome, 49
in IE, 48–49
strong, 41–42
tools, 46–50
Google Smart Lock, 49–50
RoboForm, 47f
vaults, 46–47
Pastebin sites, 101
Patches, 63–64, 68–69
Peer-to-peer method (P2P method), 67
Permanent cookies. See Persistent cookies
Persistent cookies, 30
Personal identification numbers (PIN), 89
Pew Research Center, 135
Pharming process, 95
“Phish”, 94
Phishing process, 93–94
Photo tagging setting, 133
Physical security, 25–26
PIN. See Personal identification numbers (PIN)
Plaintext, 12
Polymorphism, 54
Pop-ups, disabling and managing, 33–34
POP3 options, 82
Potentially unwanted programs (PUPs), 59
Precaution to post personals, 167–168
oversharing, 168
Pretexting method, 91–92
Privacy Checkup menu, 127
Privacy
controls in LinkedIn, 148–150, 149f
shortcuts, 126–127
in Twitter, 133–134
Privacy maintenance, 156–167
deleting and retrieving data, 163–167
data and account maintenance, 167
data existence, 165
online storage, 165–166
tools, 163–165
privacy of search, 157–158
private browsing, 158–163
untag yourself, 158
Privacy Rights Clearinghouse’s Chronology of Data
Breaches, 156
Privacy settings and tools page, 125–128, 125f
audiences in Facebook, 127f
privacy shortcuts, 126–127
Private browsing, 158–163
automatically clearing private data, 161
clearing cache, 160–161
deleting history, 160–161
tools, 162–163
Tor browser, 161–162
VPN, 162
Private data clearance, 161
Private-key cryptography. See Symmetric cryptography
Profiles review, 199
Protecting kids from technology, 201–202
cyberbullying, 221–223
prank calls, 222–223
location, 210–218
antitheft, 211–213
blacklists, 215–216
finding device, 213–214, 213f
finding safely, 214
lost or stolen, 210–211
remote wiping, 216
report it stolen, 214–216
resale, 216–218, 217f
online predators, 223–225
parental controls, 204–210, 205f
deciding on age appropriate limitations, 210
filtering and blocking, 207–209, 208f
location of computer, 210
time limits, 209–210
understanding kids activities, 205
in Windows, 206–209, 207f
passwords for kids, 202–203
privacy, 225–226
search engines, 203–204
kid-orientated search engines, 203–204
talking about inappropriate factor, 218–221
conduct, 219–220
contact, 220–221
content, 220
setting expectations, 219–221Index 235
Protocol, 5
Public key cryptography. See Asymmetric
cryptography
Public places, computer use in, 18
PUPs. See Potentially unwanted programs (PUPs)
Q
Questionnaires, 7
R
Ransomware, 55, 114
RAT. See Remote Access Trojan (RAT)
Real world, 168–174
avoiding online records, 173–174
delivery, 172–173
Internet and non-Internet based factors, 169–172
Do Not Call registry, 171
online “support”, 171
preventing mail theft, 172
telephone and mail scams, 170
Real-time protection, 59
Realizing sites, 105–107
Reconnaissance, 99–100
Remote Access Trojan (RAT), 54–55, 194–195
Remote wiping, 216
Reporting abuse, 190–191
Restore point, 73–74
RoboForm, 47, 47f
Robots (Bots), 55
Rogue antivirus, 61
Rootkits tools, 55, 104–105
Router, 35
firewalls on, 50–52
S
SafeSearch filters section, 203
Scams, 109–115
advanced fee scams, 109
intimidation and extortion, 110
offers on Internet, 110–112
contests and sweepstakes, 111–112
free offers and downloads, 110–111
online charities, 112–113
tax scams, 113
Scareware, 55, 114
Script kiddies, 101
SD cards, 216–217
Search engines, 154, 157, 203–204
kid-orientated search engines, 203–204
Secure Sockets Layer (SSL), 14–15
Security
breach, 174–176
mode, 37–38
in Twitter, 132–133
updates, 64
Security alerts settings, 84–85
Security and privacy page, 133–134
Security Settings page, 119–121, 120f, 123–125
Service packs, 63–64
Service set identifier (SSID), 37
passphrase, 38
Session cookies, 30
Shareware, 54
Shoulder surfing method, 103
Signature files, 60–61
SIM card, 216–217
SkyDrive, 166
Smart TVs and game systems, 21–22
SmartScreen Filter, 108
Social engineering, 91–96
baiting, 95–96
suspicious emails and SPAM, 94–95
technology and, 93–94
Social media, 117–118, 142, 183–184, 206
email, 76
securing, 118–121
monitoring activity, 119–121
social media site on Internet, 119
securing Facebook, 121–131
securing Twitter, 131–134
Social networking, 118
Social news, 118
Software problems and solutions
antimalware, 62–63
antivirus, 56–57
disaster recovery, 69–74
malware, 53–56
natural disaster, 53
updates, 63–69
automatic updates, 64–68
mobile device updates, 68–69
other device updates, 69
types, 63–64
viruses, 53–56
Windows Defender, 57–62
SPAM, 76, 81, 83, 94–95, 174
Spambot, 94–95, 104
Spammer, 94–95, 98
Spear phishing, 94
Spybot, 62
Spyware, 55–56
SSID. See Service set identifier (SSID)
SSL. See Secure Sockets Layer (SSL)
Standard account, 23
Stored cookies. See Persistent cookies
Strong passwords, 41–42236 Index
Subdomains, 5–6
Suspicious emails, 94–95
Symantec, 57
Symmetric cryptography, 12
T
Tailgating, 103
Tax scams, 113
Technological factors
annoying and abusive people, 184–192
blocking people, 189–190
creeping, 186–187
cyberstalking, 187
lose anonymity, 190–191
online harassment, 185
preventative measures, 187–188
reporting abuse, 190–191
thinning herd, 188
trolls and flamers, 186
unfriend, unfollow, unjoin, 188–189
anonymity, 181–184
being wary of others and yourself, 182–183
falsehood, 183
flip side, 183–184
netiquette, 179–181
emoticons, 180
Lingo, 181
online chat, 192–196
alias, 192–193
chat rooms, 193–194
IM, 193
online games, 195–196
Web cams, 194–195
online dating, 196–198
apps, 197–198
sites, 197
traditional vs. extramarital, 196–197
online entity, 198
protection, 198–200
criminal background check, 199
image search, 199–200
reviewing profiles, 199
Teen’s phone, 210
Teens, 206, 220
Thinning herd, 188
Thunderbird, 77
securing, 77–79
Timeline and Tagging settings, 128–129, 128f
Tor browser, 161–162
Tracking
cookies, 7, 30–31, 55–56
protection, 32–33
Traditional dating sites, 196–197
Transport layer security, 14–15
TransUnion service, 91
Trojan. See Trojan Horse
Trojan Horse, 56
Trolls, 186
Trusted Contacts section, 124–125
Twitter, 102, 121. See also Facebook; LinkedIn;
YouTube
securing, 131–134
passwords, 134
privacy, 133–134
security, 132–133
tweeter, 131
tweets, 131
Two-step verification, 84, 147–148
U
Uniform Resource Locator (URL), 4–5, 145
parts, 6f
reading URLs, 4–7
domain name, 5
faking sites with, 5–7
shortening services on, 6
Updates, 63–69
automatic updates, 64–68
mobile device updates, 68–69
other device updates, 69
types, 63–64
updating, 60–61
URL. See Uniform Resource Locator (URL)
Username, 36
Username section, 122
V
View As feature, 127
Virtual Private Network (VPN), 99, 162
Virus, 53–56
VPN. See Virtual Private Network (VPN)
W
Web browser security, 29–34
Chrome privacy settings, 31f
cookies, 30–32
disabling and managing pop-ups, 33–34
“Microsoft shops”, 30
tracking protection, 32–33
Web cams, 194–195
Web Filter, 52
Web-based technology, 179
WEP. See Wired Encryption Protocol (WEP)
Whaling process, 94
White hats, 96
Whitelist, 82Index 237
Whois sites, 99
Wi-Fi
components to connecting internet, 35
configuring router, 36–38
changing administrator username/password,
36–37
changing default password on Linksys router,
36f
security mode, 37–38
SSID, 37
SSID passphrase, 38
network, 12
using other people’s Wi-Fi, 38–39
security and safety, 34–41
sharing Wi-Fi with others, 39–41
setting guest network, 40–41
supporting older devices, 41
Wi-Fi Protected Access (WPA), 38
wifi. See Wi-Fi
Windows
accounts, 22–25
biometrics, 24–25
parental controls in, 206–209, 207f
Windows 8 x and 10, 48–49
Windows 10, automatic updates in, 65–67
Windows Defender, 57–62, 58f
Advanced section of Settings tab, 60
History tab, 58
Rogue antivirus, 61
scheduling regular scans, 61
settings, 59f
updating, 60–61
Windows Hello feature, 24–25
Wired Encryption Protocol (WEP), 37
Wireless Security, 37–38
Work email, 76
Work-at-home scams, 146–147
Worms, 56
WPA. See Wi-Fi Protected Access (WPA)
WPA2, 38
Y
YouTube, 117. See also Facebook; LinkedIn;
Twitter
securing, 134–137
Creator Studio button, 135–137
Z
Zombie (attacker), 104
Zombie army, 104


كلمة سر فك الضغط : books-world.net
The Unzip Password : books-world.net
أتمنى أن تستفيدوا من محتوى الموضوع وأن ينال إعجابكم

رابط من موقع عالم الكتب لتنزيل كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy
رابط مباشر لتنزيل كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy
الرجوع الى أعلى الصفحة اذهب الى الأسفل
 
كتاب The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy
الرجوع الى أعلى الصفحة 
صفحة 2 من اصل 1
 مواضيع مماثلة
-
» كتاب Easy Guide to Health and Safety
» كتاب Easy Guide to Health and Safety - Second Edition
» كتاب Managing Health and Safety - Learning Made Simple
» كتاب The Health Safety Handbook - A practical guide to health and safety law, management policies and procedures
» فيديو بعنوان كيفية تصنيع أحذية الأمان - How Safety Boots are Made

صلاحيات هذا المنتدى:لاتستطيع الرد على المواضيع في هذا المنتدى
منتدى هندسة الإنتاج والتصميم الميكانيكى :: المنتديات الهندسية :: منتدى الكتب والمحاضرات الهندسية :: منتدى الكتب والمحاضرات الهندسية الأجنبية-
انتقل الى: