Muutke küpsiste eelistusi

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals [Pehme köide]

  • Formaat: Paperback / softback, 304 pages, kõrgus x laius x paksus: 226x152x23 mm, kaal: 363 g
  • Ilmumisaeg: 08-Feb-2019
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119559618
  • ISBN-13: 9781119559610
Teised raamatud teemal:
  • Pehme köide
  • Hind: 20,73 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 24,39 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Raamatukogudele
  • Formaat: Paperback / softback, 304 pages, kõrgus x laius x paksus: 226x152x23 mm, kaal: 363 g
  • Ilmumisaeg: 08-Feb-2019
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119559618
  • ISBN-13: 9781119559610
Teised raamatud teemal:
An easy-to-read guide to protecting your digital life and your family online

The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers.  Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.

In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: How can I protect myself at home, on a personal level, away from the office? McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple Brilliance in the Basics habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths youll be able to protect yourself and your family from:





Identify theft Compromising your children Lost money Lost access to email and social media accounts

Digital security is one of the most important, and least understood, aspects of our daily lives. But it doesnt have to be. Thanks to its clear instruction, friendly tone, and practical strategies, Cyber Smart will help you rest more easily, knowing you and your family are protected from digital attack.

Arvustused

"Bart McDonough has run cybersecurity for some of the top-performing, and most secretive, hedge fund managers in the world.  he's seen every kind of attack that cyber-criminals can come up with when targeting the ultra-wealthy and has earned their trust over decades. There's no one I'd trust more for sound, practical advice on how to secure your family from digital threats." Chris DeVore, Managing Partner, Founders Co-Op

Bart has, effectively, provided the reader with the necessary weaponry to protect themselves against cyber attacks.  Effectively, he has written a cheat sheet to prevent us from being cheated.  A must read. Troy Bailey, President, Bailey Brand Management

We spend so much time thinking about our physical security, yet most of us overlook the necessity of cyber security. The stories and examples helped to simplify the concepts and provide compelling reasons to take this seriously. Cyber Smart provides a step-by-step guide that is easy to implement - this is a 'must read' for everyone! Becky Jacobs, Chief Engagement Officer, Simple Change

Cyber Security is clearly something we all know we need to deal with but very of us understand.  This book is the perfect guide for anyone that wants to take the (very necessary) steps to protect themselves from the digital threats that we all know are out there.  For someone like myself, that has very little understanding of this world, it's an easy to read, step by step, guide to protecting your most sensitive data.  More importantly, it's a practical manual for families with young children that want to give them the safe cyber security tools and habits they'll use for the rest of their lives. Neil Berkeley, Future You Media

Foreword xxiii
Introduction xxv
I Setting the Stage 1(104)
1 Overview of Cyber Risks
3(8)
Real Estate Wire Transfer Fraud Prevention Steps
5(1)
If You're a Victim of Wire Transfer Fraud
6(1)
Cyber-Risk Statistics
6(2)
Breaches, Cyberattacks, and Hacks-Oh My'
8(1)
Notes
9(2)
2 Attackers
11(12)
The Adversary
13(1)
Nation-State Attackers
14(2)
Criminal Organizations
16(1)
Terrorist Organizations
17(1)
Bad Actors Who Got Caught
17(4)
Notes
21(2)
3 Attack Targets and Goals
23(8)
How Attackers Get Your Money
24(1)
What Attackers Do with Your Money
24(1)
How Attackers Get Your Credentials
25(1)
What Attackers Do with Your Credentials
25(1)
How Attackers Get Your PII
26(1)
What Attackers Do with Your PII
26(1)
How Attackers Get Your Computing Resources
27(1)
What Attackers Do with Your Computing Resources
27(2)
Notes
29(2)
4 Attack Methods
31(34)
Social Engineering
32(1)
Phishing
33(1)
Phishing Attacks
33(1)
Email Phishing
34(1)
Spear Phishing
35(2)
Whaling
37(1)
Email Compromise
38(1)
Clone Phishing
39(1)
Voice Phishing
40(1)
SMS Phishing
41(1)
Pretexting
42(1)
Malware
43(1)
Cryptomining Malware and Cryptojacking
43(1)
Cryptomining
43(1)
Cryptojacking
44(1)
Ransomware
45(1)
Spyware
46(1)
Scareware
47(1)
Adware
47(1)
Trojans
48(1)
Wi-Fi Network Hacking
49(1)
Scams
50(1)
Fake Technical Support
51(1)
Government Agency Impersonation
52(1)
The Grandparent Scam
53(1)
Virtual Kidnapping Extortion
53(1)
Unpaid Utility Bill Scams
54(1)
Online Dating Scams
54(2)
Job Scams
56(2)
Charity Scams
58(1)
Robocalling Scams
58(3)
Notes
61(4)
5 Attack Chain
65(6)
Attack Chain Phases
67(1)
Links in the Attack Chain
68(2)
Notes
70(1)
6 Attack Vectors
71(12)
Email
72(1)
Texting
73(2)
Phone Calls
75(1)
Websites
76(2)
Software
78(1)
USB Key
78(1)
Wi-Fi
79(2)
Notes
81(2)
7 Brilliance in the Basics
83(8)
Brilliance 1: Update Your Devices
84(1)
Brilliance 2: Enable Two-Factor Authentication
85(1)
Brilliance 3: Use a Password Manager
86(1)
Brilliance 4: Install and Update Antivirus Software
87(2)
Brilliance 5: Back Up Your Data
89(1)
Notes
90(1)
8 Mistakes
91(4)
Being the Source of a Data Breach
92(1)
Mixing Work and Personal Information
93(1)
Notes
94(1)
9 Incident Response
95(10)
Falling for a Phishing Attack
96(2)
Getting Infected with Malware
98(2)
Getting Infected with Ransomware
100(2)
Email Compromise
102(3)
II Specific Recommendations 105(146)
10 Protecting Your Identity
107(18)
Methods of Identity Theft
108(2)
How to Check Whether Your PII Is Exposed
110(1)
Identity Monitoring Services
111(1)
Recommendations: Protecting Your Credit Identity
112(2)
Other Types of Identity Theft
114(1)
Medical Identity Theft
114(3)
Recommendations: Protecting Your Medical Identity
117(1)
Military Personnel Identity Theft
118(1)
Recommendations: Protecting Your Identity While in the Military
118(1)
Senior Citizen Identity Theft
119(1)
Recommendations: Protecting the Identities of Senior Citizens
120(2)
Notes
122(3)
11 Protecting Your Children
125(12)
The Growing Problem of Child Identity Theft
127(1)
Recommendations: Protecting Your Child's Identity
128(1)
Protecting Your Child on the Computer
129(2)
Smart Toy Risks
131(2)
Recommendations: Protecting Smart Toys
133(2)
Recommendations: Protecting Your Children Online
135(1)
Notes
136(1)
12 Protecting Your Money
137(14)
Home Buyer Wire Transfer Fraud
138(1)
Home Equity Wire Transfer Fraud
139(1)
IRS Impersonation Fraud
140(1)
Credit Card Fraud
141(2)
Gift Card Fraud
143(1)
Card Skimmer Fraud
144(1)
Scams Targeting the Unbanked and Underbanked
145(1)
Recommendations: Protecting Your Money
146(3)
Notes
149(2)
13 Protecting Your Email
151(8)
Yahoo Data Breach
152(1)
The Value of a Hacked Email Account
153(1)
The Challenge of Email Privacy
154(1)
Recommendations: Protecting Your Email
155(3)
Notes
158(1)
14 Protecting Your Files
159(10)
Threats to Your Files
160(1)
Threats to Your Files Not Caused by Bad Actors
161(1)
Threats to Your Files Caused by Bad Actors
161(1)
Cloud Storage vs. Local Storage
161(1)
Your Cloud File Storage Responsibilities
162(1)
Your Local File Storage Responsibilities
162(1)
Finding the Right Cloud Provider
163(1)
Cloud Storage Doesn't Equal File Backups
163(1)
Risks of Using Only an External Hard Drive
164(1)
Effective File Management
164(1)
Recommendations: Protecting Your Files
165(3)
Notes
168(1)
15 Protecting Your Social Media
169(10)
Why Bad Actors Love Social Media
171(1)
Twitter: A Bad Actor's Paradise
172(1)
How Third Parties Mine Your Social Media Data
173(3)
Recommendations: Protecting Your Social Media
176(2)
Notes
178(1)
16 Protecting Your Website Access and Passwords
179(14)
Password Hashing Slows Down Bad Actors
180(1)
Password Reuse Fuels Credential Stuffing
181(1)
The Great Password Problem
182(2)
Effective Password Management
184(1)
Password Creation Formula
185(1)
Password Creation Mistakes
186(1)
Recommendations: Protecting Your Website
Access and Passwords
187(4)
Notes
191(2)
17 Protecting Your Computer
193(10)
The Rising Threat of Cryptojacking: The Illegal Form of Cryptomining
195(1)
Cryptomining Using Web Visitors' CPU Resources
196(2)
Donating CPU Resources for Good
198(1)
Recommendations: Protecting Your Computer
198(3)
Notes
201(2)
18 Protecting Your Mobile Devices
203(14)
Protect Against Mobile Port-Out Scams
206(2)
Mobile Malware
208(1)
iPhone vs. Android Security
209(1)
Device Loss and Theft
210(1)
Recommendations: Protecting Your Mobile Devices
211(4)
Notes
215(2)
19 Protecting Your Home Wi-Fi
217(8)
Threats Against Your Home Wi-Fi Network
219(2)
Recommendations: Protecting Your Home Wi-Fi
221(3)
Notes
224(1)
20 Protecting Your IoT Devices
225(12)
Threats Against IoT Devices
227(2)
IoT Privacy Issues
229(1)
Smart Homes
230(4)
Recommendations: Protecting Your IoT Devices
234(2)
Notes
236(1)
21 Protecting Your Information When Traveling
237(14)
Public Wi-Fi Dangers
239(2)
General Travel Dangers
241(2)
Recommendations: Protecting Your Information
When Traveling (General)
243(2)
Nation-State Travel Dangers
245(1)
Recommendations: Protecting Your Information
When Traveling Abroad
246(3)
Notes
249(2)
Index 251
BART R. McDONOUGH is CEO and Founder of Agio, a hybrid managed IT and cybersecurity services provider specializing in the financial services, health care and payments industries. Bart has experience working in cybersecurity, business development and IT management within the financial services industry. He is often training individuals and their organizations on how to be safe in our increasingly complex digital world. From speaking at conferences hosted by the FBI, Goldman Sachs, JP Morgan and hundreds of others, he has learned what individuals need to know to be safe online.