Protect Your Personal Information
By Anzar Hasan and Abbas Mirza
()
About this ebook
The book does not only highlight the issues that one faces when they go online, but it also provides the solutions to the problems. Its not only this, but after reading the book, you will be able to get to know about different technical terms, the reason they present a threat to your computer, and the signals that you need to look for if you suspect that you have become a victim. The book begins with the introduction to computer security and provides the reader with an overview of the issues and the threats that your computer could face if you do not care about it. The readers will be amazed to find the section on social media threats. Most of the people are not actually aware of the threats that they face when they sign up on a social media website. Thus, the book is going to talk about the ways to protect your identity even if you have signed up for a social media website.
Anzar Hassan and Abbas Mirza are the writers of this book. They intend to take ahead the initiative of cybersecurity. They both developed G7 Security in the year 2010 while working under Arshnet Technologies. This app could currently be found on the app store. It was one of the most operative step that was taken in order to educate people about cybersecurity. It was extremely important to launch it because people were not able to find a viable solution to the problem of cyber attacks. G7 Security is a cybersecurity research and global information security services entity. This entity offers research and development, information sharing, and collaboration.
In addition to this, it is offers various services for the information and cybersecurity community. The efforts made to develop G7 Security app were recognized in Computer Worlds Mobile Access awards category for the innovative application of IT. The major aim of this app is to extend the distribution of digital information, programs, and services through mobile devices. This was the reason it was able to reach the areas where use of mobile devices is quite common. Computerworld Honors Program honors those who try to develop visionary applications of information technology through which they try promote positive social, economic, and educational change.
Their basic aim behind this book is to ensure that a nontechnical person gets to know about the threats and dangers that he and his devices face once he connects himself to the Internet. This book plays an important role in fulfilling the basic aim of the authors. After reading this book, you will be able to realize the fact that you were living a dangerous life by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused.
Anzar Hasan
Anzar Hasan Anzar Hasan is one of the leading information security audit professionals. He provided his services to Verizon’s Internal Audit Department. Before utilizing his services for Verizon, Anzar worked with the Deloitte & Touche and other notable Fortune 100 companies. He has vast experience in telecommunications/IT/IS security. He graduated in electronics from NED University of Engineering and Technology. He is a CISSP and CISM. Anzar also has graduate certificates in business analytics from Southern Methodist University (SMU) and crisis management and business continuity from Massachusetts Institute of Technology (MIT). Anzar is a member of the IEEE study groups and a frequent speaker at international conferences in the telecom industry, such as LTE, Small Cells, Virtualization North America, and many more. Anzar serves as a board member for the American Cyber Security Association. Abbas Mirza Abbas Mirza is one of the renowned personalities in the computer world. He has over fifteen years of experience in architecture, analysis, design, development, implementation, and management of information technology systems. He is the laureate of the Computerworld Honors Program 2013. He is currently a part of PepsiCo. He has managed cross-functional teams to execute highly productive projects. In the year 2010, Abbas was able to launch the G7 Security app. G7 Security is a cybersecurity research and global information security services entity. This particular entity was developed by Abbas and Anzar so that they could make a head start on the initiative of cybersecurity. Abbas earned his bachelor’s degree in business computer information systems from Midwestern State University and advanced training from Southern Methodist University (SMU). “After reading this book, you will be able to realize the fact that you were living a dangerous life by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused.”
Related to Protect Your Personal Information
Related ebooks
Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsPHP Security and Session Management: Managing Sessions and Ensuring PHP Security (2022 Guide for Beginners) Rating: 3 out of 5 stars3/5Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsThe Darknet Superpack Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsTor and the Deep Web Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsMobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsMobile Device Exploitation Cookbook Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Mind-blowing Signal 101 Guide for Beginners and Experts: Unravel the Best Signal Private Messenger Tips for Secured Calls and Chats Rating: 0 out of 5 stars0 ratingsEasy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratingsCyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsPC Safety 101 Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Your System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsCuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Practical Malware Prevention Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsQuick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsLearning Pentesting for Android Devices Rating: 5 out of 5 stars5/5
Computers For You
How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Excel 101: A Beginner's & Intermediate's Guide for Mastering the Quintessence of Microsoft Excel (2010-2019 & 365) in no time! Rating: 0 out of 5 stars0 ratingsThe Invisible Rainbow: A History of Electricity and Life Rating: 5 out of 5 stars5/5Uncanny Valley: A Memoir Rating: 4 out of 5 stars4/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5ChatGPT 4 $10,000 per Month #1 Beginners Guide to Make Money Online Generated by Artificial Intelligence Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 5 out of 5 stars5/5The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling Rating: 0 out of 5 stars0 ratingsLearning the Chess Openings Rating: 5 out of 5 stars5/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsPeople Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5
Reviews for Protect Your Personal Information
0 ratings0 reviews
Book preview
Protect Your Personal Information - Anzar Hasan
Copyright 2016 Anzar Hasan & Abbas Mirza.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the written prior permission of the author.
ISBN: 978-1-4907-7525-8 (sc)
ISBN: 978-1-4907-7527-2 (hc)
ISBN: 978-1-4907-7526-5 (e)
Library of Congress Control Number: 2016911463
Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.
Any people depicted in stock imagery provided by Thinkstock are models,
and such images are being used for illustrative purposes only.
Certain stock imagery © Thinkstock.
Trafford rev. 09/16/2016
22970.png www.trafford.com
North America & international
toll-free: 1 888 232 4444 (USA & Canada)
fax: 812 355 4082
Contents
Chapter 1 An Introduction To Computer Security
Protect Your Computer From Being Vulnerable To Attacks
Computer Security
Securing Your Wireless Network
Chapter 2 How To Ensure Security Of Computer
Home Network Security
Good Security Habits
Understanding Antivirus Software
Using Caution With E-Mail Attachments
Password Security, Protection, And Management
The Dos And Don’ts
Where To Report A Stolen Laptop
Holiday Traveling With Personal Internet-Enabled Devices
Debunking Some Common Myths
Chapter 3 Introduction To Malware
Avoid Malware
Detect Malware
Get Rid Of Malware
P2p File-Sharing Risks
Understanding Hidden Threats: Rootkits And Botnets
Why Are They Considered Threats?
What Can You Do To Protect Yourself?
Understanding Denial-Of-Service Attacks
Socializing Securely: Using Social Networking Services
PERSONAL SAFETY
Chapter 4 Disposing Of Old Devices
Get To Know Your Hard Drive
How To Clean A Hard Drive
Certain Ways To Dispose Of Your Computers
Disposing Of Your Mobile Device
Chapter 5 Understanding Mobile Apps
Mobile App Basics
Why Are Some Apps Free?
Questions About Your Privacy
Malware And Security Concerns
Mobile App User Reviews
Kids And Mobile Apps
Apps To Help You Shop In Stores
Chapter 6 Guide For Online Auctions
Get To Know How The Site Works
Check Out The Item
Check Out The Seller
When You Bid And Pay
How To Work Out Problems
Avoiding Scams
Avoid Clicking Reply Or Clicking On Links In An E-Mail Message
Report Fraud
Ways To Be Smart Online
Online Auctions For Sellers
Chapter 7 Tips For Using Public Wi-Fi Networks
How Encryption Works
How To Tell If A Website Is Encrypted
What About Mobile Apps?
Don’t Assume A Wi-Fi Hot Spot Is Secure
Protect Your Information When Using Public Wi-Fi
Chapter 8 Using Ip Cameras Safely
Before Buying An Ip Camera
Secure Wireless Transmission
Secure Internet Transmission
Multiple Users
Using Security Features
Chapter 9 Cookies: Leaving Your Mark On The Web
Understanding Cookies
Controlling Cookies
Flash Cookies
Private Browsing
Chapter 10 E-Commerce: A Facility Or Risk
Compare Products Online
Shopping Online
Investing Online
Chapter 11 Kids And The Technology
Defend Kids Online
Child Identity Theft
Kids And Mobile Phones
Kids And Socializing Online
Kids And Computer Security
Kids And Virtual Worlds
Chapter 12 The Basics Of Cloud Computing
What Is The Cloud?
How Can You Use The Cloud?
Types Of Cloud Computing
Choosing A Cloud Provider
Security
Chapter 13 Technology And The Associated Risks
Computer Security Risks To Home Users
Safeguarding Your Data
Real-World Warnings Keep You Safe Online
Tools And Resources
About The Authors
This book is dedicated to our wonderful parents who taught us, try not to become a man of success, but rather try to become a man of value.
Preface
This is a book that is going to provide you with detailed information about the threats that you and your computer face when you enter the world of the Internet. It will discuss different ways through which you can protect yourself from intruders. This book covers all the major kinds of threats that you face when you go online. The book will even discuss the threats that your kids face when they go online. Since kids are not experienced and they are unaware of the consequences of the step they are going to take, thus it is important for the parents to know the dangers their kids face in the world of the Internet. It is the kind of book that you should read once you get to an age where you start using a computer and the Internet.
The book doesn’t only highlight the issues that people face when they go online, but it also provides the solution to the problems. Not only this, but after reading the book, you will be able to get to know about different technical terms, the reason they present a threat to your computer, and the signals that you need to look for if you doubt you have become a victim. The book begins with the introduction to computer security and provides the reader with an overview of the issues and the threats that your computer could face if you do not care about it. The readers will be amazed to find the section on social media threats. Most people are not actually aware of the threats they face when they sign up on a social media website. Thus, this book is going to talk about ways to protect your identity even if you have signed up for a social media website.
Anzar Hassan and Abbas Mirza are the writers of this book. They intend to take ahead the initiative of cybersecurity. They both developed G7 Security in the year 2010 while working under Arshnet Technologies. This app can currently be found on the App Store. It was one of the most operative steps that were taken in order to educate people about cybersecurity. It was extremely important to launch it because people were not able to find a viable solution to the problem of cyber attacks. G7 Security is a cybersecurity research and global information security services entity. This entity offers research and development, information sharing, and collaboration. In addition to this, it offers various services for the information and cybersecurity community. The efforts made to develop the G7 Security app were recognized in Computerworld’s Mobile Access awards category for the innovative application of IT. The major aim of this app was to extend the distribution of digital information, programs, and services through mobile devices. This was the reason due to which it was able to reach to the areas where use of mobile devices is quite common. The Computerworld Honors Program honors those who try to develop visionary applications of information technology through which they try to promote positive social, economic, and educational change.
The authors’ basic aim behind this book is to ensure that a nontechnical person gets to know about the threats and dangers that he and his devices face once he connects himself to the Internet. This book plays an important role in fulfilling the basic aim of the authors. After reading this book, you will be able to realize the fact that you were living life in danger by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused.
Chapter 1
AN INTRODUCTION TO COMPUTER SECURITY
Protect Your Computer from Being Vulnerable to Attacks
Accessing the Internet on your computer is pretty common these days. The Internet will provide you the ease of accessing numerous products and services while sitting back home. With such ease comes the danger of attacks of viruses and other damaging elements. Use of the Internet exposes your computer to scammers, hackers, and identity thieves.
Computer Security
When you access the Internet, there are several scammers, hackers, and identity thieves that are in search of a person whose personal information could be stolen and used for illegal purposes. Your money is also prone to these attacks. These dangers nullify the benefit of the Internet; thus there are steps introduced to protect your computer from these dangerous elements. Some of the common preventions that you have heard from elders are not to provide your personal information without a valid reason and to keep your software up-to-date.
Use Security Software That Updates Automatically
There are too many bad guys who are always trying to find a way to attack your computer. They are always making an effort to find a new way to attack your computer and to access your personal information. Thus, it is highly important that you keep your software updates so that it helps protect you against the threats. There are numerous security software that can update all by themselves. You should try to use this kind of software on your computer so that, even if you forget to update, your computer is secure from attacks. There are several such companies who offer free security software from well-known companies. You should alter your operating system and web browser settings so that they update regularly. If you are not going to make sure that your software is up-to-date, then you are providing them a way to attack your computer. You should avoid buying security software from the companies that claim that they have found malware on your computers because they are actually the scammers who send in messages to get access to your computer.
Your Personal Information Is Just like Cash
Your personal information is extremely important and you need to value it as you value your cash. Scammers will try their best to present themselves as trustworthy, but you need to be careful about the fact that this information is highly confidential.
Research About the Companies You Are Really Dealing With
Research can save you from scams and other dangerous acts that you might get involved in just because your personal information was leaked on the Internet. Usually people go after the ad or the offer that looks quite attractive and then get scammed. So if you find any kind of ad or offer on the Internet just spare time to research about the company. Just type the company name with the words reviews, complaint, or scam on Google or any other search engine you prefer to use. If you find negative reviews then understand one thing—that you are on the wrong side. If you are not able to find anything then again understand that there are some issues with that.
Ensure That You Give out Your Personal Information over Encrypted Websites Only
When you are shopping online or making a banking transaction, then you need to ensure that the website uses encryption to protect your information. When the information travels from the computer to the server, then it is vulnerable to the attacks. To make sure that the website is encrypted, ensure that the website address is written as https. The s at the end states that the website is secure.
There are a few websites that use encryption only on the sign-in page. Thus, you need to make sure that each page contains security. If each page doesn’t have the required security, then the website is surely vulnerable to attack, and you are risking your information.
Safeguard Your Passwords
It is recommended that you should use strong passwords so that it is difficult for others to crack and use your information for illegal means. The following are some of the guidelines that will help you keep strong passwords:
• It is advised that you should use long passwords because it is difficult to crack long passwords. The ideal length of a strong password is ten to twelve characters.
•