My Account Log in

1 option

Surviving a Cyberattack : Securing Social Media and Protecting Your Home Network.

De Gruyter DG Plus DeG Package 2024 Part 1 Available online

View online
Format:
Book
Author/Creator:
Shipley, Todd G.
Contributor:
Bowker, Art.
Language:
English
Subjects (All):
Computer security.
Social media.
Physical Description:
1 online resource (171 pages)
Edition:
1st ed.
Place of Publication:
Bloomfield : Mercury Learning & Information, 2024.
Summary:
This book, 'Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network' by Todd G. Shipley and Art Bowker, serves as a comprehensive guide to understanding and mitigating cyber threats for both individuals and families. It covers a range of topics essential for digital security, including basic cybersecurity practices, risks associated with the Internet of Things, and strategies for safeguarding social media accounts. The authors emphasize the importance of educating oneself and others about online fraud and scams, with particular attention to protecting children and vulnerable adults. Intended for a broad audience, including those with limited technical expertise, the book provides practical advice on securing personal devices, recognizing cyber risks, and employing effective online safety measures. The authors aim to empower readers to protect their digital lives in an increasingly connected world. Generated by AI.
Contents:
Cover
Half title
Title
Copyright
Dedication
Contents
Preface
Acknowledgments
Chapter 1: Cybersurvival versus Safety
In This Chapter
Conclusion
References
Chapter 2: Digital (Cyber) Security Basics
Connecting to the Internet
Early Computer Connectivity
The Router Is the Guardian
The First Line of Defense
Provider Modems with Wifi
Internet of Things (IoT)
How Does One Spot the Cyber Risks?
What Is Our IoT Risk
Checking Devices for Home Security Risks
Some Bluetooth Dangers
Who Else Is Watching Your Webcam?
Webcam Gate
Text Message Security
Protecting One's Vehicle
Chapter 3: Safely Going Online
Internet Risks
Considerations for Securing the User's Computer for Online Use
Evaluating the Risk
Basic SOHO Computer Security Considerations
Evaluating the User's Internet Risk
The Other Risks a User Needs to Know
Steps to Protect Personal Information (PI)
Browser Functions
Selecting a Browser
Initial Browser Set-Up
Ongoing Browser Maintenance
Additional Hiding Measures
In Private Mode
Using Someone Else's WiFi
Kinds of WiFi Attacks
Identifying a WiFi Attack
Using a Virtual Private Network (VPN) for Better Security
How a VPN Works
Obtaining a VPN
A User's Personal Data Is Out There Already
Removing One's Data from Data Aggregators
How Do Criminals Share User's Data?
Using Antivirus or Malware Prevention
Antivirus/Malware Detection Software
Firewall Software
Identifying Malicious Web Sites
Other Cyber Risks
The Media Companies Who Collect User's Every Online Move
Chapter 4: Securing Social Media
Social Media Use
The Value of User's Information to Others
Revenge Porn.
Addressing Social Media Risk: Security versus Privacy
Read the Fine Print
Security
Contact Email/Cell Phone
Passwords
Privacy
Steps to Avoiding Social Media Scams
Using Pseudonyms on Social Media
Other Things Not to Do on Social Media
Does Social Media Reveal Location?
Being on Social Media Without a Profile
Social Media on the User's Cell Phone
Dating and/or Hook-up Sites
TikTok
Chapter 5: Protecting Children
Children and Technology
Instilling Best Cyberpractices
Identifying Needs and Technology
Four Basic Processes for Managing Cyber risk
Controlling Devices
Restrictions
Monitoring
Periodic Checking
Identify Programs Installed on the Device
Social Media
Online Services Especially for Minors
Children and User Agreements
Using Monitoring Software
Legal Issues
Other Issues
Final Thoughts on Monitoring Software
Educating Children on Social Media Passwords
Crimes Children Encounter Online
Other Online Considerations
Monitoring Children's Online Activities
Instilling Good Cell Phone Habits
Red Flags to Look Out for with Children
Additional Considerations
Chapter 6: Protecting Adult Family Members
The Risk to Vulnerable Adults is Real
Common Online Threats
Prevention
Monitoring for Vulnerable Adult Scams
Noticing Behaviors Associated with Victimization
Difficult Conversations
Navigating Social Media Safely for Seniors
Identifying Scams
Dealing with Potential Cyberattacks/Scams
Reporting to the Proper Authorities
Helping Vulnerable Adults Recover from Online Scams
Digital Legacy and Afterlife Planning
Closing a Deceased Family Member's Social Media Accounts
References.
Chapter 7: Surviving in the Online Marketplace Bargaining Hunting in the Twenty-First Century
The Traditional Marketplace
The Internet Marketplace
Common Internet Fraud
Common Methods to Further Internet Fraud
Protection Methods in Online Markets
Online Research of Telephone Numbers
Investigate the Merchant Before Buying
Identifying Fraudulent Web Sites
Vendors Using Social Media Accounts
Dangers Using Personal Debit/Credit Cards
Third-Party Wallets or Virtual Cards
Report Problems Immediately
Chapter 8: Protecting A Small Home Business
SHB in the Twenty-First Century
Preventing Common Business Scams
Common Scams that Target Small Businesses
Instituting Best Practices
Free and Low-Cost Online Cybersecurity Learning Content
Acceptable Use Policy (AUP)
Enforcing AUP
Business Social Media
Conferencing Security Best Practices
Attendees
Host
Data Back Ups Are an SHB Necessity
Making a Data Backup Plan
Storage Needs/Cost
Cloud Storage
Local Data Backups
Using a Network Attached Storage Device
Disposing of SHB Equipment
Data Retention Legal Requirements
Device Tracking
Chapter 9: Surviving a Digital (Cyber) Attack
In this Chapter
Surviving a Cyberattack
Phishing, Spear Phishing, and Smishing
Regular Data Backups
The Immediate Cyber-Response
Ransomware Attacks
Responding to Cyber Harassment
Contacting Law Enforcement
Reporting a Cybercrime
Documentation
Reporting the Crime
Credit Monitoring versus Freezing
Credit Monitoring
Credit Freeze
Fraud Alerts
Extended Fraud Alert
Personal Cyber Insurance
Chapter 10: Future Trends
Preparing for the Future
The Basics
Artificial Intelligence (AI).
Detecting AI in Use
Facial Recognition
A Stalker's Dream
Index.
Notes:
Description based on publisher supplied metadata and other sources.
Part of the metadata in this record was created by AI, based on the text of the resource.
ISBN:
9781501520396
1501520393
OCLC:
1463085896

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account