Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Protect Your Personal Information
Protect Your Personal Information
Protect Your Personal Information
Ebook213 pages2 hours

Protect Your Personal Information

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This is a book that is going to provide you detailed information about the threats that you and your computer are exposed to when you enter the world of Internet. It will discuss different ways through which you can protect yourself from intruders. This book covers all the major kinds of threats that you face when you go online. The book will even discuss the threats that your kids face when they go online. Since kids are not experienced and they are unaware of the consequences of the step they are going to take, it is thus important for the parents to know the dangers their kids face on the world of Internet. It is a kind of book that you should be bound to read once you get in an age where you start using the computer and the Internet.

The book does not only highlight the issues that one faces when they go online, but it also provides the solutions to the problems. Its not only this, but after reading the book, you will be able to get to know about different technical terms, the reason they present a threat to your computer, and the signals that you need to look for if you suspect that you have become a victim. The book begins with the introduction to computer security and provides the reader with an overview of the issues and the threats that your computer could face if you do not care about it. The readers will be amazed to find the section on social media threats. Most of the people are not actually aware of the threats that they face when they sign up on a social media website. Thus, the book is going to talk about the ways to protect your identity even if you have signed up for a social media website.

Anzar Hassan and Abbas Mirza are the writers of this book. They intend to take ahead the initiative of cybersecurity. They both developed G7 Security in the year 2010 while working under Arshnet Technologies. This app could currently be found on the app store. It was one of the most operative step that was taken in order to educate people about cybersecurity. It was extremely important to launch it because people were not able to find a viable solution to the problem of cyber attacks. G7 Security is a cybersecurity research and global information security services entity. This entity offers research and development, information sharing, and collaboration.

In addition to this, it is offers various services for the information and cybersecurity community. The efforts made to develop G7 Security app were recognized in Computer Worlds Mobile Access awards category for the innovative application of IT. The major aim of this app is to extend the distribution of digital information, programs, and services through mobile devices. This was the reason it was able to reach the areas where use of mobile devices is quite common. Computerworld Honors Program honors those who try to develop visionary applications of information technology through which they try promote positive social, economic, and educational change.

Their basic aim behind this book is to ensure that a nontechnical person gets to know about the threats and dangers that he and his devices face once he connects himself to the Internet. This book plays an important role in fulfilling the basic aim of the authors. After reading this book, you will be able to realize the fact that you were living a dangerous life by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused.
LanguageEnglish
Release dateSep 16, 2016
ISBN9781490775265
Protect Your Personal Information
Author

Anzar Hasan

Anzar Hasan Anzar Hasan is one of the leading information security audit professionals. He provided his services to Verizon’s Internal Audit Department. Before utilizing his services for Verizon, Anzar worked with the Deloitte & Touche and other notable Fortune 100 companies. He has vast experience in telecommunications/IT/IS security. He graduated in electronics from NED University of Engineering and Technology. He is a CISSP and CISM. Anzar also has graduate certificates in business analytics from Southern Methodist University (SMU) and crisis management and business continuity from Massachusetts Institute of Technology (MIT). Anzar is a member of the IEEE study groups and a frequent speaker at international conferences in the telecom industry, such as LTE, Small Cells, Virtualization North America, and many more. Anzar serves as a board member for the American Cyber Security Association. Abbas Mirza Abbas Mirza is one of the renowned personalities in the computer world. He has over fifteen years of experience in architecture, analysis, design, development, implementation, and management of information technology systems. He is the laureate of the Computerworld Honors Program 2013. He is currently a part of PepsiCo. He has managed cross-functional teams to execute highly productive projects. In the year 2010, Abbas was able to launch the G7 Security app. G7 Security is a cybersecurity research and global information security services entity. This particular entity was developed by Abbas and Anzar so that they could make a head start on the initiative of cybersecurity. Abbas earned his bachelor’s degree in business computer information systems from Midwestern State University and advanced training from Southern Methodist University (SMU). “After reading this book, you will be able to realize the fact that you were living a dangerous life by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused.”

Related to Protect Your Personal Information

Related ebooks

Computers For You

View More

Related articles

Reviews for Protect Your Personal Information

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Protect Your Personal Information - Anzar Hasan

    Copyright 2016 Anzar Hasan & Abbas Mirza.

    All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the written prior permission of the author.

    ISBN: 978-1-4907-7525-8 (sc)

    ISBN: 978-1-4907-7527-2 (hc)

    ISBN: 978-1-4907-7526-5 (e)

    Library of Congress Control Number: 2016911463

    Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.

    Any people depicted in stock imagery provided by Thinkstock are models,

    and such images are being used for illustrative purposes only.

    Certain stock imagery © Thinkstock.

    Trafford rev. 09/16/2016

    22970.png www.trafford.com

    North America & international

    toll-free: 1 888 232 4444 (USA & Canada)

    fax: 812 355 4082

    Contents

    Chapter 1 An Introduction To Computer Security

    Protect Your Computer From Being Vulnerable To Attacks

    Computer Security

    Securing Your Wireless Network

    Chapter 2 How To Ensure Security Of Computer

    Home Network Security

    Good Security Habits

    Understanding Antivirus Software

    Using Caution With E-Mail Attachments

    Password Security, Protection, And Management

    The Dos And Don’ts

    Where To Report A Stolen Laptop

    Holiday Traveling With Personal Internet-Enabled Devices

    Debunking Some Common Myths

    Chapter 3 Introduction To Malware

    Avoid Malware

    Detect Malware

    Get Rid Of Malware

    P2p File-Sharing Risks

    Understanding Hidden Threats: Rootkits And Botnets

    Why Are They Considered Threats?

    What Can You Do To Protect Yourself?

    Understanding Denial-Of-Service Attacks

    Socializing Securely: Using Social Networking Services

    PERSONAL SAFETY

    Chapter 4 Disposing Of Old Devices

    Get To Know Your Hard Drive

    How To Clean A Hard Drive

    Certain Ways To Dispose Of Your Computers

    Disposing Of Your Mobile Device

    Chapter 5 Understanding Mobile Apps

    Mobile App Basics

    Why Are Some Apps Free?

    Questions About Your Privacy

    Malware And Security Concerns

    Mobile App User Reviews

    Kids And Mobile Apps

    Apps To Help You Shop In Stores

    Chapter 6 Guide For Online Auctions

    Get To Know How The Site Works

    Check Out The Item

    Check Out The Seller

    When You Bid And Pay

    How To Work Out Problems

    Avoiding Scams

    Avoid Clicking Reply Or Clicking On Links In An E-Mail Message

    Report Fraud

    Ways To Be Smart Online

    Online Auctions For Sellers

    Chapter 7 Tips For Using Public Wi-Fi Networks

    How Encryption Works

    How To Tell If A Website Is Encrypted

    What About Mobile Apps?

    Don’t Assume A Wi-Fi Hot Spot Is Secure

    Protect Your Information When Using Public Wi-Fi

    Chapter 8 Using Ip Cameras Safely

    Before Buying An Ip Camera

    Secure Wireless Transmission

    Secure Internet Transmission

    Multiple Users

    Using Security Features

    Chapter 9 Cookies: Leaving Your Mark On The Web

    Understanding Cookies

    Controlling Cookies

    Flash Cookies

    Private Browsing

    Chapter 10 E-Commerce: A Facility Or Risk

    Compare Products Online

    Shopping Online

    Investing Online

    Chapter 11 Kids And The Technology

    Defend Kids Online

    Child Identity Theft

    Kids And Mobile Phones

    Kids And Socializing Online

    Kids And Computer Security

    Kids And Virtual Worlds

    Chapter 12 The Basics Of Cloud Computing

    What Is The Cloud?

    How Can You Use The Cloud?

    Types Of Cloud Computing

    Choosing A Cloud Provider

    Security

    Chapter 13 Technology And The Associated Risks

    Computer Security Risks To Home Users

    Safeguarding Your Data

    Real-World Warnings Keep You Safe Online

    Tools And Resources

    About The Authors

    This book is dedicated to our wonderful parents who taught us, try not to become a man of success, but rather try to become a man of value.

    Preface

    This is a book that is going to provide you with detailed information about the threats that you and your computer face when you enter the world of the Internet. It will discuss different ways through which you can protect yourself from intruders. This book covers all the major kinds of threats that you face when you go online. The book will even discuss the threats that your kids face when they go online. Since kids are not experienced and they are unaware of the consequences of the step they are going to take, thus it is important for the parents to know the dangers their kids face in the world of the Internet. It is the kind of book that you should read once you get to an age where you start using a computer and the Internet.

    The book doesn’t only highlight the issues that people face when they go online, but it also provides the solution to the problems. Not only this, but after reading the book, you will be able to get to know about different technical terms, the reason they present a threat to your computer, and the signals that you need to look for if you doubt you have become a victim. The book begins with the introduction to computer security and provides the reader with an overview of the issues and the threats that your computer could face if you do not care about it. The readers will be amazed to find the section on social media threats. Most people are not actually aware of the threats they face when they sign up on a social media website. Thus, this book is going to talk about ways to protect your identity even if you have signed up for a social media website.

    Anzar Hassan and Abbas Mirza are the writers of this book. They intend to take ahead the initiative of cybersecurity. They both developed G7 Security in the year 2010 while working under Arshnet Technologies. This app can currently be found on the App Store. It was one of the most operative steps that were taken in order to educate people about cybersecurity. It was extremely important to launch it because people were not able to find a viable solution to the problem of cyber attacks. G7 Security is a cybersecurity research and global information security services entity. This entity offers research and development, information sharing, and collaboration. In addition to this, it offers various services for the information and cybersecurity community. The efforts made to develop the G7 Security app were recognized in Computerworld’s Mobile Access awards category for the innovative application of IT. The major aim of this app was to extend the distribution of digital information, programs, and services through mobile devices. This was the reason due to which it was able to reach to the areas where use of mobile devices is quite common. The Computerworld Honors Program honors those who try to develop visionary applications of information technology through which they try to promote positive social, economic, and educational change.

    The authors’ basic aim behind this book is to ensure that a nontechnical person gets to know about the threats and dangers that he and his devices face once he connects himself to the Internet. This book plays an important role in fulfilling the basic aim of the authors. After reading this book, you will be able to realize the fact that you were living life in danger by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused.

    Chapter 1

    AN INTRODUCTION TO COMPUTER SECURITY

    Protect Your Computer from Being Vulnerable to Attacks

    Accessing the Internet on your computer is pretty common these days. The Internet will provide you the ease of accessing numerous products and services while sitting back home. With such ease comes the danger of attacks of viruses and other damaging elements. Use of the Internet exposes your computer to scammers, hackers, and identity thieves.

    Computer Security

    When you access the Internet, there are several scammers, hackers, and identity thieves that are in search of a person whose personal information could be stolen and used for illegal purposes. Your money is also prone to these attacks. These dangers nullify the benefit of the Internet; thus there are steps introduced to protect your computer from these dangerous elements. Some of the common preventions that you have heard from elders are not to provide your personal information without a valid reason and to keep your software up-to-date.

    Use Security Software That Updates Automatically

    There are too many bad guys who are always trying to find a way to attack your computer. They are always making an effort to find a new way to attack your computer and to access your personal information. Thus, it is highly important that you keep your software updates so that it helps protect you against the threats. There are numerous security software that can update all by themselves. You should try to use this kind of software on your computer so that, even if you forget to update, your computer is secure from attacks. There are several such companies who offer free security software from well-known companies. You should alter your operating system and web browser settings so that they update regularly. If you are not going to make sure that your software is up-to-date, then you are providing them a way to attack your computer. You should avoid buying security software from the companies that claim that they have found malware on your computers because they are actually the scammers who send in messages to get access to your computer.

    Your Personal Information Is Just like Cash

    Your personal information is extremely important and you need to value it as you value your cash. Scammers will try their best to present themselves as trustworthy, but you need to be careful about the fact that this information is highly confidential.

    Research About the Companies You Are Really Dealing With

    Research can save you from scams and other dangerous acts that you might get involved in just because your personal information was leaked on the Internet. Usually people go after the ad or the offer that looks quite attractive and then get scammed. So if you find any kind of ad or offer on the Internet just spare time to research about the company. Just type the company name with the words reviews, complaint, or scam on Google or any other search engine you prefer to use. If you find negative reviews then understand one thing—that you are on the wrong side. If you are not able to find anything then again understand that there are some issues with that.

    Ensure That You Give out Your Personal Information over Encrypted Websites Only

    When you are shopping online or making a banking transaction, then you need to ensure that the website uses encryption to protect your information. When the information travels from the computer to the server, then it is vulnerable to the attacks. To make sure that the website is encrypted, ensure that the website address is written as https. The s at the end states that the website is secure.

    There are a few websites that use encryption only on the sign-in page. Thus, you need to make sure that each page contains security. If each page doesn’t have the required security, then the website is surely vulnerable to attack, and you are risking your information.

    Safeguard Your Passwords

    It is recommended that you should use strong passwords so that it is difficult for others to crack and use your information for illegal means. The following are some of the guidelines that will help you keep strong passwords:

    • It is advised that you should use long passwords because it is difficult to crack long passwords. The ideal length of a strong password is ten to twelve characters.

    Enjoying the preview?
    Page 1 of 1