1 option
Surviving a Cyberattack : Securing Social Media and Protecting Your Home Network.
- Format:
- Book
- Author/Creator:
- Shipley, Todd G.
- Language:
- English
- Subjects (All):
- Computer security.
- Social media.
- Physical Description:
- 1 online resource (171 pages)
- Edition:
- 1st ed.
- Place of Publication:
- Bloomfield : Mercury Learning & Information, 2024.
- Summary:
- This book, 'Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network' by Todd G. Shipley and Art Bowker, serves as a comprehensive guide to understanding and mitigating cyber threats for both individuals and families. It covers a range of topics essential for digital security, including basic cybersecurity practices, risks associated with the Internet of Things, and strategies for safeguarding social media accounts. The authors emphasize the importance of educating oneself and others about online fraud and scams, with particular attention to protecting children and vulnerable adults. Intended for a broad audience, including those with limited technical expertise, the book provides practical advice on securing personal devices, recognizing cyber risks, and employing effective online safety measures. The authors aim to empower readers to protect their digital lives in an increasingly connected world. Generated by AI.
- Contents:
- Cover
- Half title
- Title
- Copyright
- Dedication
- Contents
- Preface
- Acknowledgments
- Chapter 1: Cybersurvival versus Safety
- In This Chapter
- Conclusion
- References
- Chapter 2: Digital (Cyber) Security Basics
- Connecting to the Internet
- Early Computer Connectivity
- The Router Is the Guardian
- The First Line of Defense
- Provider Modems with Wifi
- Internet of Things (IoT)
- How Does One Spot the Cyber Risks?
- What Is Our IoT Risk
- Checking Devices for Home Security Risks
- Some Bluetooth Dangers
- Who Else Is Watching Your Webcam?
- Webcam Gate
- Text Message Security
- Protecting One's Vehicle
- Chapter 3: Safely Going Online
- Internet Risks
- Considerations for Securing the User's Computer for Online Use
- Evaluating the Risk
- Basic SOHO Computer Security Considerations
- Evaluating the User's Internet Risk
- The Other Risks a User Needs to Know
- Steps to Protect Personal Information (PI)
- Browser Functions
- Selecting a Browser
- Initial Browser Set-Up
- Ongoing Browser Maintenance
- Additional Hiding Measures
- In Private Mode
- Using Someone Else's WiFi
- Kinds of WiFi Attacks
- Identifying a WiFi Attack
- Using a Virtual Private Network (VPN) for Better Security
- How a VPN Works
- Obtaining a VPN
- A User's Personal Data Is Out There Already
- Removing One's Data from Data Aggregators
- How Do Criminals Share User's Data?
- Using Antivirus or Malware Prevention
- Antivirus/Malware Detection Software
- Firewall Software
- Identifying Malicious Web Sites
- Other Cyber Risks
- The Media Companies Who Collect User's Every Online Move
- Chapter 4: Securing Social Media
- Social Media Use
- The Value of User's Information to Others
- Revenge Porn.
- Addressing Social Media Risk: Security versus Privacy
- Read the Fine Print
- Security
- Contact Email/Cell Phone
- Passwords
- Privacy
- Steps to Avoiding Social Media Scams
- Using Pseudonyms on Social Media
- Other Things Not to Do on Social Media
- Does Social Media Reveal Location?
- Being on Social Media Without a Profile
- Social Media on the User's Cell Phone
- Dating and/or Hook-up Sites
- TikTok
- Chapter 5: Protecting Children
- Children and Technology
- Instilling Best Cyberpractices
- Identifying Needs and Technology
- Four Basic Processes for Managing Cyber risk
- Controlling Devices
- Restrictions
- Monitoring
- Periodic Checking
- Identify Programs Installed on the Device
- Social Media
- Online Services Especially for Minors
- Children and User Agreements
- Using Monitoring Software
- Legal Issues
- Other Issues
- Final Thoughts on Monitoring Software
- Educating Children on Social Media Passwords
- Crimes Children Encounter Online
- Other Online Considerations
- Monitoring Children's Online Activities
- Instilling Good Cell Phone Habits
- Red Flags to Look Out for with Children
- Additional Considerations
- Chapter 6: Protecting Adult Family Members
- The Risk to Vulnerable Adults is Real
- Common Online Threats
- Prevention
- Monitoring for Vulnerable Adult Scams
- Noticing Behaviors Associated with Victimization
- Difficult Conversations
- Navigating Social Media Safely for Seniors
- Identifying Scams
- Dealing with Potential Cyberattacks/Scams
- Reporting to the Proper Authorities
- Helping Vulnerable Adults Recover from Online Scams
- Digital Legacy and Afterlife Planning
- Closing a Deceased Family Member's Social Media Accounts
- References.
- Chapter 7: Surviving in the Online Marketplace Bargaining Hunting in the Twenty-First Century
- The Traditional Marketplace
- The Internet Marketplace
- Common Internet Fraud
- Common Methods to Further Internet Fraud
- Protection Methods in Online Markets
- Online Research of Telephone Numbers
- Investigate the Merchant Before Buying
- Identifying Fraudulent Web Sites
- Vendors Using Social Media Accounts
- Dangers Using Personal Debit/Credit Cards
- Third-Party Wallets or Virtual Cards
- Report Problems Immediately
- Chapter 8: Protecting A Small Home Business
- SHB in the Twenty-First Century
- Preventing Common Business Scams
- Common Scams that Target Small Businesses
- Instituting Best Practices
- Free and Low-Cost Online Cybersecurity Learning Content
- Acceptable Use Policy (AUP)
- Enforcing AUP
- Business Social Media
- Conferencing Security Best Practices
- Attendees
- Host
- Data Back Ups Are an SHB Necessity
- Making a Data Backup Plan
- Storage Needs/Cost
- Cloud Storage
- Local Data Backups
- Using a Network Attached Storage Device
- Disposing of SHB Equipment
- Data Retention Legal Requirements
- Device Tracking
- Chapter 9: Surviving a Digital (Cyber) Attack
- In this Chapter
- Surviving a Cyberattack
- Phishing, Spear Phishing, and Smishing
- Regular Data Backups
- The Immediate Cyber-Response
- Ransomware Attacks
- Responding to Cyber Harassment
- Contacting Law Enforcement
- Reporting a Cybercrime
- Documentation
- Reporting the Crime
- Credit Monitoring versus Freezing
- Credit Monitoring
- Credit Freeze
- Fraud Alerts
- Extended Fraud Alert
- Personal Cyber Insurance
- Chapter 10: Future Trends
- Preparing for the Future
- The Basics
- Artificial Intelligence (AI).
- Detecting AI in Use
- Facial Recognition
- A Stalker's Dream
- Index.
- Notes:
- Description based on publisher supplied metadata and other sources.
- Part of the metadata in this record was created by AI, based on the text of the resource.
- ISBN:
- 9781501520396
- 1501520393
- OCLC:
- 1463085896
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.