About the Author
Legal
Introduction
Chapter 1 - Even The Unsinkable Titanic Sunk
- There is no such thing as an unhackable system
- You don’t need five deadbolts if your neighbor hides his key under the welcome mat
Chapter 2 - K.I.S.S. - Keep It Secure Stupid!
- Never overestimate the technical ability of the common user
- Never underestimate the technical ability of the common user
- Never underestimate the technical ability of the your attackers
- The Internet is a Dangerous Place
Chapter 3 - Never Use a Cannon to Kill a Mosquito
- Cyber Security is about managing risk
- Security is Worthless if no work can be performed
- Is It Safe To Download Computer Software From The Internet
- Intrusion Detection
- Firewalls and You
- Anti-virus Software
- Anti-Spyware Software
Chapter 4 - Trust No One
- In God We Trust, All Others We Verify - Phishing Explained
- Understanding Phishing
- How Spammers and Phishers Get Your Email Address
- Top 5 Myths About Phishing
- Don’t Fall for the Bait
- Anti-Phishing Software
- What’s in a Password?
- Moving Beyond Passwords: Two Factor Authentication
Chapter 5 - Keep a Secret, Secret
- Passing a Note in Class
- The Secret Decoder Ring
- Beyond Encoding - Encryption
- Privacy Online
Chapter 6 - Two is One and One is None
- The Importance of Backups
- The Importance of Securing Backups
- The Importance of Testing Restoration of Backups
Chapter 7 - Always Take Out the Trash
- The Internet is Forever
- Delete Does Not Delete
- What is Identity Theft?
- Dumpster Diving, Dumpster Fire
- Preventing Identity Theft
- When (not if) Identity Theft Happens to You
- Your Liability as a Victim of Identity Theft
