Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010285234 | QA76.9.A25 C444 2014 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.
The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You'll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.
The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who's watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!
Author Notes
Denny Cherry (MCSA, MCDBA, MCTS, MCITP, MCM) has been working with Microsoft technology for over 15 years starting with Windows 3.51 and SQL Server 6.5. In 2009, Denny was named as a Microsoft MVP for the Microsoft SQL Server product, and in 2011 Denny earned the Microsoft Certified Master certification for SQL Server 2008. Denny has written dozens of articles for a variety of websites as well as print magazines on a variety of subjects including SQL Server, Clustering, Storage Configuration, and SharePoint.
Table of Contents
Dedication | p. v |
Acknowledgments | p. vii |
Author Biography | p. xi |
Introduction | p. xiii |
Chapter 1 Storing Your Personal Information Online | p. 1 |
Storing your personal information online | p. 1 |
How much information you share with companies | p. 2 |
Risks of sharing too much information online | p. 3 |
Knowing how companies protect your information | p. 5 |
Cookies and websites | p. 6 |
Summary | p. 17 |
Chapter 2 Usernames and Passwords for Websites. | p. 19 |
Picking a username | p. 19 |
Picking a password | p. 21 |
How passwords are figured out | p. 22 |
Unique passwords | p. 23 |
Passphrases | p. 26 |
Two-factor authentication | p. 27 |
Using fob-based systems | p. 27 |
Using software-based two-factor authentication systems | p. 28 |
Using a text-messaging-based system | p. 29 |
The more important the longer they should be | p. 30 |
Summary | p. 31 |
Chapter 3 Your Home Network | p. 33 |
Securing your home network | p. 33 |
Securing your router | p. 34 |
Securing your Wi-Fi network | p. 38 |
Letting others onto your Wi-Fi network | p. 52 |
Other devices on the network | p. 53 |
Summary | p. 55 |
Chapter 4 Securing Your Home Computer | p. 57 |
Data encryption for the home user | p. 58 |
Native Windows data encryption | p. 59 |
What do those website security logos mean? | p. 66 |
When Tech Support calls you | p. 69 |
Internet games and downloads | p. 71 |
Application stores | p. 72 |
Windows antivirus software | p. 72 |
Apple computers need antivirus software | p. 73 |
Cell phones and tablets | p. 74 |
Summary | p. 76 |
Chapter 5 Posting Information Online | p. 77 |
Kinds of information that shouldn't be posted online | p. 77 |
How to protect information that is posted online | p. 82 |
p. 82 | |
p. 83 | |
Flickr | p. 88 |
MySpace | p. 93 |
Summary | p. 95 |
Chapter 6 Who's Watching What You Do? | p. 97 |
How can someone watch what I do? | p. 97 |
p. 98 | |
Web browsing traffic | p. 101 |
How can a government watch what I do? | p. 103 |
SSL versus the NSA | p. 104 |
How can I stop people from watching what I do? | p. 105 |
p. 105 | |
Web browsing | p. 113 |
Consequences | p. 117 |
Summary | p. 121 |
Chapter 7 Laws and Internet Privacy | p. 123 |
The law and changing technology | p. 123 |
PRISM | p. 123 |
Canadian version of PRISM | p. 126 |
Is all this legal? | p. 127 |
Is all this moral? | p. 128 |
Summary | p. 128 |
Index | p. 129 |