Cover image for The basics of digital privacy : simple tools to protect your personal information and your identity online
The basics of digital privacy : simple tools to protect your personal information and your identity online
Personal Author:
Publication Information:
Amsterdam : Elsevier, 2014
Physical Description:
xiii, 132 p. : ill. ; 23 cm.
Added Author:


Item Barcode
Call Number
Material Type
Item Category 1
30000010285234 QA76.9.A25 C444 2014 Open Access Book Book

On Order



Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.

The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You'll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.

The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who's watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!

Author Notes

Denny Cherry (MCSA, MCDBA, MCTS, MCITP, MCM) has been working with Microsoft technology for over 15 years starting with Windows 3.51 and SQL Server 6.5. In 2009, Denny was named as a Microsoft MVP for the Microsoft SQL Server product, and in 2011 Denny earned the Microsoft Certified Master certification for SQL Server 2008. Denny has written dozens of articles for a variety of websites as well as print magazines on a variety of subjects including SQL Server, Clustering, Storage Configuration, and SharePoint.

Table of Contents

Dedicationp. v
Acknowledgmentsp. vii
Author Biographyp. xi
Introductionp. xiii
Chapter 1 Storing Your Personal Information Onlinep. 1
Storing your personal information onlinep. 1
How much information you share with companiesp. 2
Risks of sharing too much information onlinep. 3
Knowing how companies protect your informationp. 5
Cookies and websitesp. 6
Summaryp. 17
Chapter 2 Usernames and Passwords for Websites.p. 19
Picking a usernamep. 19
Picking a passwordp. 21
How passwords are figured outp. 22
Unique passwordsp. 23
Passphrasesp. 26
Two-factor authenticationp. 27
Using fob-based systemsp. 27
Using software-based two-factor authentication systemsp. 28
Using a text-messaging-based systemp. 29
The more important the longer they should bep. 30
Summaryp. 31
Chapter 3 Your Home Networkp. 33
Securing your home networkp. 33
Securing your routerp. 34
Securing your Wi-Fi networkp. 38
Letting others onto your Wi-Fi networkp. 52
Other devices on the networkp. 53
Summaryp. 55
Chapter 4 Securing Your Home Computerp. 57
Data encryption for the home userp. 58
Native Windows data encryptionp. 59
What do those website security logos mean?p. 66
When Tech Support calls youp. 69
Internet games and downloadsp. 71
Application storesp. 72
Windows antivirus softwarep. 72
Apple computers need antivirus softwarep. 73
Cell phones and tabletsp. 74
Summaryp. 76
Chapter 5 Posting Information Onlinep. 77
Kinds of information that shouldn't be posted onlinep. 77
How to protect information that is posted onlinep. 82
Twitterp. 82
Facebookp. 83
Flickrp. 88
MySpacep. 93
Summaryp. 95
Chapter 6 Who's Watching What You Do?p. 97
How can someone watch what I do?p. 97
E-mailp. 98
Web browsing trafficp. 101
How can a government watch what I do?p. 103
SSL versus the NSAp. 104
How can I stop people from watching what I do?p. 105
E-mailp. 105
Web browsingp. 113
Consequencesp. 117
Summaryp. 121
Chapter 7 Laws and Internet Privacyp. 123
The law and changing technologyp. 123
PRISMp. 123
Canadian version of PRISMp. 126
Is all this legal?p. 127
Is all this moral?p. 128
Summaryp. 128
Indexp. 129