Is It Safe?
PROTECTING YOUR COMPUTER, YOUR BUSINESS, AND YOURSELF ONLINE
IDENTITY THEFT. DATA THEFT. INTERNET FRAUD. ONLINE
SURVEILLANCE. EMAIL SCAMS.
Hacks, attacks, and viruses. The Internet is a dangerous place. In years past, you could protect your computer from malicious activity by installing an antivirus program and activating a firewall utility. Unfortunately, that’s no longer good enough; the Internet has become a much darker place, plagued not only by rogue software but also by dangerous criminals and shadowy government agencies. Is It Safe? addresses the new generation of security threat. It presents information about each type of threat and then discusses ways to minimize and recover from those threats. Is It Safe? differs from other security books by focusing more on the social aspects of online security than purely the technical aspects. Yes, this book still covers topics such as antivirus programs and spam blockers, but it recognizes that today’s online security issues are more behavioral in nature–phishing schemes, email scams, and the like.
Are you being scammed? Learn how to spot the newest and most insidious computer security threats–fraudulent retailers, eBay scammers, online con artists, and the like.
Is your identity safe? Avoid being one of the nine million Americans each year who have their identities stolen. Today’s real Internet threats aren’t viruses and spam. Today’s real threat are thieves who steal your identity, rack up thousands on your credit card, open businesses under your name, commit crimes, and forever damage your reputation!
Is Big Brother watching? Get the scoop on online tracking and surveillance. We examine just who might be tracking your online activities and why.
Is your employer watching you? How to tell when you’re being monitored; and how to determine what is acceptable and what isn’t.
Michael Miller has written more than 80 nonfiction books over the past two decades. His best-selling books include Que’s YouTube 4 You, Googlepedia: The Ultimate Google Resource, iPodpedia: The Ultimate iPod and iTunes Resource, and Absolute Beginner’s Guide to Computer Basics. He has established a reputation for clearly explaining technical topics to nontechnical readers and for offering useful real-world advice about complicated topics.
Table of contents
- About the Author
- We Want to Hear from You!
- Reader Services
I. Protecting Against Identity Theft
1. Identity Theft: How Big a Problem?
- Who Are You?
- What Is Identity Theft?
- How Big Is the Identity Theft Problem?
- Who Is Most Vulnerable to Identity Theft?
- How Do Identity Thieves Steal Your Personal Information?
- What Happens When Your Identity Is Stolen?
2. How to Keep Your Personal Information Personal
- Step One: Be Aware
Step Two: Keep Your Data Secure
- Protecting Your Computer Data
- Protecting Your Physical Data
- Step Three: Question Authority
- Step Four: Monitor Your Situation
- ID Theft Protection Services—Real or Con?
3. Repairing a Stolen Identity
- How Do You Know Whether Your Identity Has Been Stolen?
- Stopping the Fraud
Repairing the Damage
- Disputing Unauthorized Transactions
- Closing Fraudulent Bank Accounts
- Replacing Compromised Documents
- Recovering from Bankruptcy Fraud
- Recovering from Investment Fraud
- Recovering from Website Fraud
- Recovering from Criminal Fraud
- Dealing with Collection Agencies
- Monitoring and Correcting Your Credit Reports
- 1. Identity Theft: How Big a Problem?
II. Protecting Against Data Theft
- 4. Data Theft: How Big a Problem?
5. Protecting Corporate Data
- Data Loss Prevention—It’s Not Optional
- Discouraging Copying to Portable Storage Devices
- Locking Down Corporate Laptops
- Minimizing Large-Scale Data Theft
- Fighting Data Theft on the State and Federal Level
- 6. Recovering from Data Theft
III. Protecting Against Online Fraud
7. Online Fraud: How Big a Problem?
- Understanding Online Shopping Fraud
- Understanding Online Auction Fraud
8. How to Not Be a Victim of Online Fraud
Protecting Yourself from Online Shopping Fraud
- Researching Retailers Before You Buy
- The Right and the Wrong Ways to Pay
- Reporting Fraudulent Business Practices
Top Ten Tips for Making Online Shopping Even Safer
- Tip #1: Trust Your Instincts
- Tip #2: Shop with Merchants You Know
- Tip #3: Check for Complaints
- Tip #4: Look for the WebAssured Logo
- Tip #5: Look for a Secure Site
- Tip #6: Look for Real-World Contact Info
- Tip #7: Don’t Provide Any More Information Than You Have To
- Tip #8: Safeguard Your Password
- Tip #9: Pay by Credit Card
- Tip #10: If It Sounds Too Good to Be True—It Probably Is!
Protecting Yourself from Online Auction Fraud
- Protecting Yourself from Phishing Scams
- Protecting Yourself Against Fraudulent Sellers
- Protecting Yourself from Wire Transfer Scams
- Protecting Yourself from Hijacked Accounts
- Protecting Yourself with an Escrow Service
- Getting Help if You’ve Been Victimized by an Unscrupulous Seller
- Protecting Yourself Against Fraudulent Buyers
- Protecting Yourself from Online Shopping Fraud
9. Fraud on the Corporate Level: Online Advertising Click Fraud
- How Does Pay-Per-Click Advertising Work?
- What Is Click Fraud?
- Who Benefits from Click Fraud?
- How Widespread Is Click Fraud?
- What Can You Do to Combat Click Fraud?
- 7. Online Fraud: How Big a Problem?
IV. Protecting Against Email Spam and Scams
10. Email Fraud: How Big a Problem?
Understanding Email Scams
- Work-from-Home Scams
- Merchandise Resale Scams
- Reshipping Scams
- Third-Party Receiver of Funds Scams
- Multilevel Marketing Scams
- Investment Scams
- Advance Fee Loan Scams
- Bogus Credit Card Offers
- Credit Card Loss Protection Scams
- Credit Repair Fraud
- Debt Elimination Scams
- Buyer’s Club Scams
- Magazine Sale Scams
- Charity Scams
- Free Government Grant Scams
- Scholarship Scams
- Free Prize Scams
- Lottery Scams
- Billing Fraud
- Fake Tax Refunds
- Nigerian Letter Scam
- Understanding the World of Phishing
- Measuring the Cost of Email and Phishing Scams
- Understanding Email Scams
- 11. Avoiding Email Fraud and Phishing Scams
12. Reducing Email Spam
- Understanding Email Spam
- Sizing the Spam Problem
- How to Reduce Email Spam
- Dealing with Blacklists
- 10. Email Fraud: How Big a Problem?
V. Protecting Against Online Surveillance
- 13. Online Surveillance: How Big a Problem?
14. Dealing with Surveillance at Work
- Why Do Companies Spy on Their Employees?
- How Do Companies Spy on Their Employees?
- Monitoring Employees’ Outside Activities
- Balancing Employer and Employee Rights
15. Big Brother Is Watching You
- A Short History of Government Surveillance
- Government Surveillance Programs Today
- High-Tech Surveillance
- Is It Legal?
- Is It Right?
16. Covering Your Tracks Online
- Hiding Your Tracks by Managing Your Cookies
- Browsing the Web, Anonymously
- Sending Email, Anonymously
17. Protecting Yourself—and Your Children—from Online Predators
- Protecting Yourself from Cyberstalkers
- Escalating the Danger: When Cyberstalkers Become Online Predators
- Protecting Your Children from Online Stalkers and Predators
- Defending Against Cyberbullies
- 18. Engaging in Your Own Surveillance: Tracking Your Children’s Online Activity
VI. Protecting Against Computer Viruses and Spyware
19. Computer Viruses and Spyware: How Big a Problem?
Understanding Computer Viruses
- A Short—But Costly—History of Computer Viruses
- How Computer Viruses Work
- How to Catch a Virus
- Understanding Different Types of Computer Viruses
- Understanding Spyware
- Sizing the Problem
- Understanding Computer Viruses
20. Defending Against Computer Viruses
- How Do You Know Whether Your Computer Is Infected?
- Preventing Virus Attacks with Safe Computing
- Protecting Your System with Anti-Virus Software
- Recovering from a Virus Infection
- Cleaning a Virus from Your System
- Restoring Your System
21. Avoiding Spyware
- Do You Have Spyware on Your System?
- Avoiding Spyware-Infested Websites and Programs
- Using Anti-Spyware Programs
- Removing Stubborn Spyware Programs
- Securing Your Web Browser
- Blocking Spyware Domains
- 19. Computer Viruses and Spyware: How Big a Problem?
VII. Protecting Against Computer Hacks and Attacks
22. Computer Attacks: How Big a Problem?
- What Is a Computer Attack?
What Are the Different Methods Used for Computer Attacks?
- Social Engineering Attacks
- Impersonation Attacks
- Transitive Trust Attacks
- Infrastructure Attacks
- Denial of Service Attacks
- Session Hijacking
- Data-Driven Attacks
- Multistaged Attacks
- Staged Download Attacks
- Computer Attacks and Cyberterrorism
- How Is a Computer Attack Executed?
- How High Is Your Risk?
23. Defending Your Home Network from Attack
- Evaluating Your Risk
- Recognizing an Attack
- Reducing Your Risk of Attack
- Protecting Your Computers with a Firewall
- Securing a Wireless Home Network
24. Defending Your Company Network from Attack
- Preparing for an Attack
- Defending Against a Network Attack
- Defending Against Internal Security Breaches
- Recognizing an In-Process Attack
- Dealing with and Recovering from a Serious Attack
25. Defending Your Website from Attack
- How Can Your Website Be Attacked?
- Defending Against Website Hacks and Attacks
- Recovering from a Website Attack
- 22. Computer Attacks: How Big a Problem?
- Title: Is It Safe? Protecting Your Computer, Your Business, and Yourself Online
- Release date: June 2008
- Publisher(s): Que
- ISBN: None
You might also like
Programming Rust, 2nd Edition
The Rust programming language offers the rare and valuable combination of statically verified memory safety and …
The Definitive Guide to Java Platform Best Practices–Updated for Java 7, 8, and 9 Java has …
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition
Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. …
Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within
Learn how to build a defense program against insider threats Insiders are not always employees and …