Book description
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history.
This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
- Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use
- Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Authors
- Acknowledgments
- Chapter 1. What is cyber safety?
- Chapter 2. Before connecting to the Internet
- Chapter 3. Software problems and solutions
- Chapter 4. Email safety and security
- Chapter 5. Cybercrime
- Chapter 6. Protecting yourself on social media
- Chapter 7. Finding a job online
- Chapter 8. Protecting your reputation
- Chapter 9. Beyond technology—dealing with people
- Chapter 10. Protecting your kids
- Index
Product information
- Title: The Basics of Cyber Safety
- Author(s):
- Release date: August 2016
- Publisher(s): Syngress
- ISBN: 9780124166394
You might also like
book
Privacy, Regulations, and Cybersecurity
Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Cybersecurity of Industrial Systems
How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, …
book
The Cyber Risk Handbook
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide …