Book description
Is It Safe?
PROTECTING YOUR COMPUTER, YOUR BUSINESS, AND YOURSELF ONLINE
IDENTITY THEFT. DATA THEFT. INTERNET FRAUD. ONLINE
SURVEILLANCE. EMAIL SCAMS.
Hacks, attacks, and viruses. The Internet is a dangerous place. In years past, you could protect your computer from malicious activity by installing an antivirus program and activating a firewall utility. Unfortunately, that’s no longer good enough; the Internet has become a much darker place, plagued not only by rogue software but also by dangerous criminals and shadowy government agencies. Is It Safe? addresses the new generation of security threat. It presents information about each type of threat and then discusses ways to minimize and recover from those threats. Is It Safe? differs from other security books by focusing more on the social aspects of online security than purely the technical aspects. Yes, this book still covers topics such as antivirus programs and spam blockers, but it recognizes that today’s online security issues are more behavioral in nature–phishing schemes, email scams, and the like.
Are you being scammed? Learn how to spot the newest and most insidious computer security threats–fraudulent retailers, eBay scammers, online con artists, and the like.
Is your identity safe? Avoid being one of the nine million Americans each year who have their identities stolen. Today’s real Internet threats aren’t viruses and spam. Today’s real threat are thieves who steal your identity, rack up thousands on your credit card, open businesses under your name, commit crimes, and forever damage your reputation!
Is Big Brother watching? Get the scoop on online tracking and surveillance. We examine just who might be tracking your online activities and why.
Is your employer watching you? How to tell when you’re being monitored; and how to determine what is acceptable and what isn’t.
Michael Miller has written more than 80 nonfiction books over the past two decades. His best-selling books include Que’s YouTube 4 You, Googlepedia: The Ultimate Google Resource, iPodpedia: The Ultimate iPod and iTunes Resource, and Absolute Beginner’s Guide to Computer Basics. He has established a reputation for clearly explaining technical topics to nontechnical readers and for offering useful real-world advice about complicated topics.
Table of contents
- Copyright
- About the Author
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Introduction
-
I. Protecting Against Identity Theft
- 1. Identity Theft: How Big a Problem?
- 2. How to Keep Your Personal Information Personal
-
3. Repairing a Stolen Identity
- How Do You Know Whether Your Identity Has Been Stolen?
- Stopping the Fraud
-
Repairing the Damage
- Disputing Unauthorized Transactions
- Closing Fraudulent Bank Accounts
- Replacing Compromised Documents
- Recovering from Bankruptcy Fraud
- Recovering from Investment Fraud
- Recovering from Website Fraud
- Recovering from Criminal Fraud
- Dealing with Collection Agencies
- Monitoring and Correcting Your Credit Reports
- II. Protecting Against Data Theft
-
III. Protecting Against Online Fraud
- 7. Online Fraud: How Big a Problem?
-
8. How to Not Be a Victim of Online Fraud
-
Protecting Yourself from Online Shopping Fraud
- Researching Retailers Before You Buy
- The Right and the Wrong Ways to Pay
- Reporting Fraudulent Business Practices
-
Top Ten Tips for Making Online Shopping Even Safer
- Tip #1: Trust Your Instincts
- Tip #2: Shop with Merchants You Know
- Tip #3: Check for Complaints
- Tip #4: Look for the WebAssured Logo
- Tip #5: Look for a Secure Site
- Tip #6: Look for Real-World Contact Info
- Tip #7: Don’t Provide Any More Information Than You Have To
- Tip #8: Safeguard Your Password
- Tip #9: Pay by Credit Card
- Tip #10: If It Sounds Too Good to Be True—It Probably Is!
-
Protecting Yourself from Online Auction Fraud
- Protecting Yourself from Phishing Scams
- Protecting Yourself Against Fraudulent Sellers
- Protecting Yourself from Wire Transfer Scams
- Protecting Yourself from Hijacked Accounts
- Protecting Yourself with an Escrow Service
- Getting Help if You’ve Been Victimized by an Unscrupulous Seller
- Protecting Yourself Against Fraudulent Buyers
-
Protecting Yourself from Online Shopping Fraud
- 9. Fraud on the Corporate Level: Online Advertising Click Fraud
-
IV. Protecting Against Email Spam and Scams
-
10. Email Fraud: How Big a Problem?
-
Understanding Email Scams
- Work-from-Home Scams
- Merchandise Resale Scams
- Reshipping Scams
- Third-Party Receiver of Funds Scams
- Multilevel Marketing Scams
- Investment Scams
- Advance Fee Loan Scams
- Bogus Credit Card Offers
- Credit Card Loss Protection Scams
- Credit Repair Fraud
- Debt Elimination Scams
- Buyer’s Club Scams
- Magazine Sale Scams
- Charity Scams
- Free Government Grant Scams
- Scholarship Scams
- Free Prize Scams
- Lottery Scams
- Billing Fraud
- Fake Tax Refunds
- Nigerian Letter Scam
- Understanding the World of Phishing
- Measuring the Cost of Email and Phishing Scams
-
Understanding Email Scams
- 11. Avoiding Email Fraud and Phishing Scams
- 12. Reducing Email Spam
-
10. Email Fraud: How Big a Problem?
-
V. Protecting Against Online Surveillance
- 13. Online Surveillance: How Big a Problem?
- 14. Dealing with Surveillance at Work
- 15. Big Brother Is Watching You
- 16. Covering Your Tracks Online
- 17. Protecting Yourself—and Your Children—from Online Predators
- 18. Engaging in Your Own Surveillance: Tracking Your Children’s Online Activity
-
VI. Protecting Against Computer Viruses and Spyware
- 19. Computer Viruses and Spyware: How Big a Problem?
- 20. Defending Against Computer Viruses
- 21. Avoiding Spyware
-
VII. Protecting Against Computer Hacks and Attacks
-
22. Computer Attacks: How Big a Problem?
- What Is a Computer Attack?
- What Are the Different Methods Used for Computer Attacks?
- Computer Attacks and Cyberterrorism
- How Is a Computer Attack Executed?
- How High Is Your Risk?
- 23. Defending Your Home Network from Attack
- 24. Defending Your Company Network from Attack
- 25. Defending Your Website from Attack
-
22. Computer Attacks: How Big a Problem?
Product information
- Title: Is It Safe? Protecting Your Computer, Your Business, and Yourself Online
- Author(s):
- Release date: June 2008
- Publisher(s): Que
- ISBN: None
You might also like
book
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC …
book
The Truth About Avoiding Scams
"You should read this book and take Steve Weisman's advice. And from the money and assets …
book
CompTIA® Security+™ SY0-401 Exam Cram, Fourth Edition
The Publisher regrets that the CD/DVD content for this title cannot be made available Online. CompTIA® …
book
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance …