Book description
In nontechnical language and engaging style, 10 Donts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps.
Its a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Donts cant do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble.
10 Donts employs personal anecdotes and major news stories to illustrate what canand all too often doeshappen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Donts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Dont. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes.
Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Donts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you dont get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physicalin short, so that you dont trust anyone overanything.
Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.
Table of contents
- Cover
- Title
- Copyright
- Apress Business: The Unbiased Source of Business Information
- Dedication
- Contents
- Foreword
- About the Authors
- Acknowledgments
- Introduction
- Chapter 1: Don’t Get Phished
- Chapter 2: Don’t Give Up Your Passwords
- Chapter 3: Don’t Get Lost in “The Cloud”
- Chapter 4: Don’t Look for a Free Lunch
- Chapter 5: Don’t Do Secure Things from Insecure Places
- Chapter 6: Don’t Let the Snoops In
- Chapter 7: Don’t Be Careless with Your Phone
- Chapter 8: Don’t Use Dinosaurs
- Chapter 9: Don’t Trust Anyone Over . . . Anything
- Chapter 10: Don’t Forget the Physical
- Conclusion
- Index
- Other Apress Business Titles You Will Find Useful
Product information
- Title: 10 Don'ts on Your Digital Devices: The Non-Techies Survival Guide to Cyber Security and Privacy
- Author(s):
- Release date: October 2014
- Publisher(s): Apress
- ISBN: 9781484203675
You might also like
book
Privacy, Regulations, and Cybersecurity
Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to …
book
The Basics of Cyber Safety
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on …
book
Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s …
book
Handbook of System Safety and Security
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat …