Cybersecurity For Dummies. Joseph Steinberg

Читать онлайн книгу.

Cybersecurity For Dummies - Joseph Steinberg


Скачать книгу
Public Wi-Fi Safely (Or Better Yet, Don’t Use It!) Hire a Pro Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches Marriott Target Sony Pictures U.S. Office of Personnel Management Anthem Colonial Pipeline and JBS SA Chapter 21: Ten Ways to Safely Use Public Wi-Fi Use Your Cellphone as a Mobile Hotspot Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi Don’t Perform Sensitive Tasks over Public Wi-Fi Don’t Reset Passwords When Using Public Wi-Fi Use a VPN Service Use Tor Use Encryption Turn Off Sharing Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks Understand the Difference between True Public Wi-Fi and Shared Wi-Fi

      13  Index

      14  About the Author

      15  Advertisement Page

      16  Connect with Dummies

      17  End User License Agreement

      List of Tables

      1 Chapter 14TABLE 14-1 A Comparison of Full, Incremental, and Differential Backups

      2 Chapter 16TABLE 16-1 Restoration Processes

      List of Illustrations

      1 Chapter 2FIGURE 2-1: A DDoS attack.FIGURE 2-2: A man-in-the-middle interception.FIGURE 2-3: Ransomware demanding ransom.

      2 Chapter 6FIGURE 6-1: Network setup in which the work router communicates through the hom...FIGURE 6-2: Network setup using separate routers for work and home.

      3 Chapter 7FIGURE 7-1: A (slightly edited image of) a one-time credit card number generato...FIGURE 7-2: One-time password for Snapchat generated by the app Authy — an exam...FIGURE 7-3: A secure website.FIGURE 7-4: Email with a link to a phony page.FIGURE 7-5: My website as seen in a Tor browser, with the Tor circuit informati...

      4 Chapter 8FIGURE 8-1: A password manager.FIGURE 8-2: Secure Folder, the secure area app provided by Samsung for its Andr...FIGURE 8-3: A phone fingerprint sensor on a Samsung Galaxy S9 in an Otterbox ca...FIGURE 8-4: An RSA SecureID brand one-time password generator hardware token.

      5 Chapter 9FIGURE 9-1: A phishing email.FIGURE 9-2: Example of a baiting message.FIGURE 9-3: An example of an Instagram account impersonating me, using my name,...

      6 Chapter 10FIGURE 10-1: Inbound access is one major difference between businesses and indi...

      7 Chapter 12FIGURE 12-1: A ransomware screen from an overt infection.FIGURE 12-2: A defaced website (ostensibly by the hacker group known as the Syr...FIGURE 12-3: The Microsoft Windows Task Manager.FIGURE 12-4: An example of communication problems while streaming video. Note t...FIGURE 12-5: Internet connections configured to use a proxy. If you do not use ...FIGURE 12-6: The modern version of the notorious Blue Screen of Death that appe...FIGURE 12-7: This pop-up window from adware malware attempts to scare people in...

      Guide

      1  Cover

      2  Title Page

      3  Copyright

      4 Table of Contents

      5  Begin Reading

      6  Index

      7  About the Author

      Pages

      1  i

      2  ii

      3  1

      4  2

      5  3

      6  4

      7  5

      8  6

      9  7

      10  8

      11  9

      12  10

      13  11

      14  12

      15  13

      16  14

      17  15

      18  16

      19 


Скачать книгу