Chapter 8

Protection Methods

Abstract

This chapter explains how to protect yourself against spying. General protection methods are covered in each chapter; however, this chapter covers what is not directly discussed in each specific chapter’s technology realm. This chapter wraps up the book as a summary and offers more tips on how to safeguard yourself and your belongings (data) from theft or harm.

Keywords

Identity Theft
Hacking
Tracking
Hardening
Theft
Surveillance
Mitigation
Reconnaissance
Web Camera
Threat
Hacker
Attack

Protect yourself!

As we end this book on how to defend yourself against surveillance and reconnaissance attacks, the best advice up front would be to protect yourself, your data, and your assets. Protect your identity. ...

Get Cyber Reconnaissance, Surveillance and Defense now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.