Security in the Digital World-

Book description

Cyberspace, the Internet, computer networks, the digital world – call it what you will – is always developing. And so are the threats and risks of being online.

Security in the Digital World explains the common digital threats to home users, home offices, mobile users, consumers and parents alike, as well as providing tips, advice and guidance. It doesn’t matter if you are working in the most mature enterprise environment, unemployed, retired or still at school, whether you often have a smartphone in your hand or only use an e-reader, you are at risk.

Security in the Digital World is a straightforward guide for the home user, parent, consumer and home office, providing a fountain of knowledge for modern security needs. It gives an overview of who conducts cyber attacks any why, and where cyber threats come from. It also explains what you can do to protect yourself and others, and provides a personal cyber security risk assessment.

This must-have guide gives up-to-date information on consumer risks and provides:

Ten tips to keep your digital information secure;

  • Understanding and awareness of information security and cyber threats;
  • Explanations of what social engineering is and techniques used by cyber criminals;
  • Advice on what to look out for online and your rights as a consumer; and
  • Guidance on common threats in the digital age, including malware, social engineering and ransomware.

    There is little technical knowledge or skill needed to understand and apply the book’s tips and advice, and there are lots of images to help guide you.

    From the top ten tips and the breakdown of consumer risks, to social networking and parental security, this book is an essential guide for anyone and everyone trying to stay safe and secure in the evolving digital world.

    Put the necessary controls on your home network and protect your family from cyber crime.

  • Table of contents

    1. Cover
    2. Title
    3. Copyright
    4. Dedication
    5. Preface
    6. Acknowledgements
    7. About the Author
    8. Contents
    9. Introduction
    10. Personal digital security top ten
    11. Chapter 1: The Internet
      1. 1.1 Connecting
      2. 1.2 Browsers
      3. 1.3 Browser history
      4. 1.4 Tabs
      5. 1.5 Search engine
      6. 1.6 McAfee WebAdvisor
      7. 1.7 Spam filter
      8. 1.8 Ad blocker
      9. 1.9 Cookies
      10. 1.10 Email
      11. 1.11 iCloud
    12. Chapter 2: The threats
      1. 2.1 Cyber crime
      2. 2.2 The who?
      3. 2.3 The why
      4. 2.4 The where
    13. Chapter 3: The how
      1. 3.1 Social engineering
      2. 3.2 Malware
      3. 3.3 Ransomware
      4. 3.4 Trends
      5. 3.5 Summary
    14. Chapter 4: Operating system – computers and laptops
      1. 4.1 MacOS
      2. 4.2 Windows
    15. Chapter 5: Home office
      1. 5.1 Home office and home networks
      2. 5.2 Computer disposal
    16. Chapter 6: Mobile security
      1. 6.1 Laptop
      2. 6.2 Public Wi-Fi
      3. 6.3 VPN
      4. 6.4 Public computers
      5. 6.5 USB devices
      6. 6.6 International travel
      7. 6.7 Summary
    17. Chapter 7: Smartphones and tablets
      1. 7.1 Apple
      2. 7.2 Android
      3. 7.3 Antivirus
      4. 7.4 VPN
      5. 7.5 USB charging points
      6. 7.6 Bluetooth
      7. 7.7 Mobile device disposal
    18. Chapter 8: Consumers
      1. 8.1 Certifications
      2. 8.2 Online purchasing
      3. 8.3 Chip and PIN cards
      4. 8.4 Contactless cards
      5. 8.5 Motioncard
      6. 8.6 Apple Pay and Internet of Things (IoT) payments
      7. 8.7 ATMs/Cashpoints
    19. Chapter 9: Personal and consumer rights
      1. 9.1 Personal information and your rights
      2. 9.2 Reviewing a company
      3. 9.3 Medical information and institutions
      4. 9.4 Plans and activities
      5. 9.5 Big data
    20. Chapter 10: Internet of Things (IoT)
      1. 10.1 Default password
      2. 10.2 Firewall
      3. 10.3 Network vulnerability management
      4. 10.4 Disposal of IoT devices
      5. 10.5 Cyber physical security
    21. Chapter 11: Social networking security
      1. 11.1 Facebook
      2. 11.2 LinkedIn
      3. 11.3 Plenty of Fish
      4. 11.4 Tinder
      5. 11.5 WhatsApp
      6. 11.6 Snapchat
      7. 11.7 Twitter
    22. Chapter 12: Parental security
      1. 12.1 Managing online security for children
      2. 12.2 Threats to children
      3. 12.3 Inappropriate content
      4. 12.4 Protect and manage
    23. Chapter 13: Resilience
    24. Chapter 14: Personal cyber security risk assessment
    25. ITG Resources

    Product information

    • Title: Security in the Digital World-
    • Author(s): Graham Day
    • Release date: November 2017
    • Publisher(s): IT Governance Publishing
    • ISBN: None