O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Basics of Cyber Safety

Book Description

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history.

This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

  • Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use
  • Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. About the Authors
  7. Acknowledgments
  8. Chapter 1. What is cyber safety?
    1. Abstract
    2. What Is Cyber Safety?
    3. Paying Attention to What’s Out There
    4. Privacy
    5. Encryption
    6. Monitoring Online Activity
    7. Identifying the Devices You Use, and Where You Use Them
    8. Using Different Windows Accounts
    9. Physical Security
    10. Summary
    11. Further Reading
  9. Chapter 2. Before connecting to the Internet
    1. Abstract
    2. Securing Your Web Browser
    3. Wi-fi Security and Safety
    4. Passwords
    5. Firewalls
    6. Summary
    7. Reference
  10. Chapter 3. Software problems and solutions
    1. Abstract
    2. Malware and Viruses
    3. Antivirus
    4. Windows Defender
    5. Antimalware
    6. Staying Up-To-Date
    7. Disaster Recovery
    8. Summary
    9. Reference
  11. Chapter 4. Email safety and security
    1. Abstract
    2. Email Protection
    3. Gmail Security
    4. Summary
  12. Chapter 5. Cybercrime
    1. Abstract
    2. What Is a Cybercriminal?
    3. Identity Theft
    4. Social Engineering
    5. Hacking
    6. Scams
    7. Summary
    8. References
  13. Chapter 6. Protecting yourself on social media
    1. Abstract
    2. What Is Social Media?
    3. Securing Social Media
    4. Securing Facebook
    5. Securing Twitter
    6. Securing YouTube
    7. Summary
    8. References
  14. Chapter 7. Finding a job online
    1. Abstract
    2. Looking for Work Online
    3. Online Resumes
    4. Work-at-Home Scams
    5. Securing LinkedIn
    6. Summary
    7. References
  15. Chapter 8. Protecting your reputation
    1. Abstract
    2. Finding Yourself
    3. Maintaining Privacy
    4. Think Twice, Post Once
    5. The Real World and Cyberspace
    6. What to Do After a Security Breach
    7. Digital Legacies
    8. Summary
    9. References
  16. Chapter 9. Beyond technology—dealing with people
    1. Abstract
    2. Netiquette
    3. Anonymity
    4. Annoying and Abusive People
    5. Online Chat
    6. Online Dating
    7. Meeting People in Person
    8. Protecting Yourself
    9. Summary
    10. References
  17. Chapter 10. Protecting your kids
    1. Abstract
    2. Protecting Your Kids
    3. Passwords for Kids
    4. Search Engines
    5. Parental Controls
    6. Location
    7. Talking About What’s Inappropriate
    8. Cyberbullying
    9. Online Predators
    10. Privacy
    11. Summary
    12. References
  18. Index