O'Reilly logo

Cyber Reconnaissance, Surveillance and Defense by Robert Shimonski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Protection Methods

Abstract

This chapter explains how to protect yourself against spying. General protection methods are covered in each chapter; however, this chapter covers what is not directly discussed in each specific chapter’s technology realm. This chapter wraps up the book as a summary and offers more tips on how to safeguard yourself and your belongings (data) from theft or harm.

Keywords

Identity Theft
Hacking
Tracking
Hardening
Theft
Surveillance
Mitigation
Reconnaissance
Web Camera
Threat
Hacker
Attack

Protect yourself!

As we end this book on how to defend yourself against surveillance and reconnaissance attacks, the best advice up front would be to protect yourself, your data, and your assets. Protect your identity. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required