Internet Security Fundamentals: A Modern Day Digital Survival GuideAn easy to understand guide of the most commonly faced security threats any computer user is likely to come across via email, social media and online shopping. This is not aimed at people studying Internet Security or CISSP, but general users, though still helpful to both. |
Contents
Chapter Page Chapter Page 1 Introduction 2 2 Viruses Trojans 4 3 Vulnerabilities Security Flaws 18 4 Online Scams 27 5 A Question Of Trust 36 6 ... | 94 |
Online Dating | 97 |
Cryptomining updated | 99 |
Ransomware | 101 |
Using A Shared Computer | 105 |
Using Shared Wifi | 106 |
Flash Java updated | 107 |
Removing A Virus | 119 |
Parental Control Software | 131 |
Backups | 134 |
Typos | 138 |
File Transfer Services | 139 |
Spam Junk Email | 142 |
Two Factor Authentication | 145 |
User Admin Accounts | 148 |
In Conclusion | 151 |
Passwords | 122 |
Data Breaches | 126 |
Alternative Operating Systems | 128 |
Internet Routers | 129 |
Checklist Of Things To Do | 152 |
Resources Glossary updated | 153 |
Authors Note | 160 |
Common terms and phrases
activities actually adverts allows antivirus appear Apple attachment avoid backup bank basic browser called claiming compromised confirm connection contain create credit card criminals dating device document easy email address enable enter everything example fake filters Flash follow genuine give Google infected install issue Java known legitimate look major malicious malware Microsoft million mobile never normally offer Office Once option password payment phishing probably problem protection provider receive recently Remember remove router scam share smartphone social media someone spam stop sure thing trick Trojan turn typically update users virus viruses vulnerabilities Windows