Chapter
Publicly Available
Contents
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xxv
- Acknowledgments xxix
- Chapter 1: Who Are the Bad Guys? 1
- Chapter 2: Cyberthreats 7
- Chapter 3: Ransomware 53
- Chapter 4: Social Engineering 77
- Chapter 5: Passwords 95
- Chapter 6: MFA (Multifactor Authentication) 127
- Chapter 7: Viruses and Worms 147
- Chapter 8: Patches and Updates 163
- Chapter 9: Email 185
- Chapter 10: Social Media 207
- Chapter 11: Backups 229
- Chapter 12: Browsing Safely 265
- Chapter 13: Virtual Private Networks 295
- Chapter 14: Firewalls 307
- Chapter 15: Mobile Devices 323
- Chapter 16: Home Networks 349
- Chapter 17: Encryption 365
- Chapter 18: Internet of Things 381
- Chapter 19: Reducing Digital Footprints on The Internet 393
- Chapter 20: Final Tips 419
- Index 435
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xxv
- Acknowledgments xxix
- Chapter 1: Who Are the Bad Guys? 1
- Chapter 2: Cyberthreats 7
- Chapter 3: Ransomware 53
- Chapter 4: Social Engineering 77
- Chapter 5: Passwords 95
- Chapter 6: MFA (Multifactor Authentication) 127
- Chapter 7: Viruses and Worms 147
- Chapter 8: Patches and Updates 163
- Chapter 9: Email 185
- Chapter 10: Social Media 207
- Chapter 11: Backups 229
- Chapter 12: Browsing Safely 265
- Chapter 13: Virtual Private Networks 295
- Chapter 14: Firewalls 307
- Chapter 15: Mobile Devices 323
- Chapter 16: Home Networks 349
- Chapter 17: Encryption 365
- Chapter 18: Internet of Things 381
- Chapter 19: Reducing Digital Footprints on The Internet 393
- Chapter 20: Final Tips 419
- Index 435