The Cybersecurity Self-Help Guide
- Length: 226 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2021-10-19
- ISBN-10: 0367709538
- ISBN-13: 9780367709532
- Sales Rank: #3723586 (See Top 100 Books)
Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online.
Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic.
This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers.
Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.
Cover Half Title Title Page Copyright Page Contents Preface Introduction: The World of Cybercrime The World of Cybercrime Understanding Various Types of Cybercrimes Hacking Malware Spoofing Identity Theft Phishing Pharming Web Jacking Cyberstalking/Cyberbullying A Denial-of-Service (DoS) Attack Social Engineering Multiple Choice Questions Answer key Chapter 1: All About IP Addresses Scenario Objectives Introduction to IP Address About the Network Interface Card Understanding Public and Private IP Addresses Public IP Private IP Network Address Translation About Dynamic Host Configuration Protocol (DHCP) Understanding IPv4 and IPv6 Addressing System IPv4 Address Network Part Host Part IPv6 Address About the Domain Name System (DNS) Understanding Static and Dynamic IP Addresses Static IP Address Dynamic IP Address Tracking an IP Address Let’s Do It! – Tracking Yourself Let’s Do It! – Tracking Someone Else from the IP Address Similar Websites to Track IP Address Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 2: Router Security Scenario Objectives Introduction to Default Password Vulnerabilities Modem Router What Do We Have in Our Homes? Types of Routers Wired Routers Wireless Routers Virtual Routers Default Passwords About Phishing Websites Main Rules for Protecting a Wireless Router About Media Access Control Address (MAC) Methods to Keep Your Router Safe Updating the Router’s Firmware Turning Off Unneeded Services Setting Stronger Passwords Let’s Do It! – Checking the Router Security Probing Further Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 3: Applying 2-Factor Authentication (2-FA) Scenario Objectives Introduction to Password Capturing Password Capturing Methods Weak Passwords Dictionary Attack Brute Force Attack Keylogger Phishing Pages How to Defeat All These Attacks? What Is 2-FA Let’s Do It! – Applying 2-FA to Your Gmail Account Google Prompt Method Verifying Setting Up 2-FA for Your WhatsApp Account Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 4: Has My Email Been Hacked? Scenario 1 Scenario 2 Objectives Introduction to Log-in Activities Remove Third-Party Access In the Case of Hotmail/Outlook.com Service Provider Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 5: Implementing Online Parental Control Scenario Overview Introduction to Cyber Threats to Children Child Pornography Cyberstalking Cyberbullying Hacking Parental Controls Google Safe Search Google Family Link App for Parents Let’s Do It! – Steps to Set Up Google Family Link for Parents Device Compatibility For Kids and Teens For Parents Changing DNS in Your Router Let’s Do It! – Steps to Add These DNS Servers to your Router More Companies That Provide Family-Friendly DNS Servers CleanBrowsing SafeSurfer DNS for Family Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 6: The Golden Rule to Be on Social Media Scenario Objectives Introduction to Watermarking What Is a Watermark? Let’s Do It! – Downloading and Using uMark Software Some Other Websites for Watermarking Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 7: Smartphone Security/Finding Your Lost Phone Scenario Objectives Introduction to Smartphone Security Smartphone Security Authentication in Smartphones Passwords PIN Number Pattern Lock Fingerprint Scanner Facial Recognition Tracking Your Phone Let’s Do It! – Tracking Your Missing Android Phone Let’s Do It! – Tracking Your Missing iPhone Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 8: All about Proxy and VPN Scenario Objectives Introduction to Anonymity Proxy VPN Pros and Cons of Using a VPN Pros of Using a VPN Cons of Using a VPN Setting Up a VPN in an Android Smartphone Let’s Do It! – Getting a VPN on Your Android Phone Setting Up a Personal VPN in a Windows 10 PC Let’s Do It! – A Quick Guide to Setting Up a VPN in a Windows 10 PC Link to Other Similar VPN Some Points to Consider before Selecting a VPN Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 9: Collecting the Digital EviVIdence Scenario Overview Introduction to Importance of Digital Evidence Let’s Do It! – Producing an Email/Web Page/Video as Digital Evidence Producing a WhatsApp Chat as Digital Evidence Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 10: Debit/Credit Card Security Scenario Overview Introduction to Skimmers How Bad Actors Capture Your Card Details and ATM PIN What Is EMV? Protecting Yourself from Such Frauds Multiple Choice Questions Answer Key Lab Time Chapter 11: Website Hacking and Security Implementation Scenario Overview Introduction to Website Hacking Website Vulnerability and Threats SQL Injection XSS DoS and DDoS Brute Force Attack Dictionary Attack Website Security Purchasing a Hosting Service Take Care of the Hosting Plan You Choose SSL Certificates Software Updates Website Scanning Web-Application Firewall Stop Using Public Computers/Wi-Fi to Access the Website Dashboard Login Attempts to Be Limited Making a Backup of Your Website Tracking Website Logs Regularly Purchasing Protection, Monitoring and Repair Service Let’s Do It! – Checking Which Hosting Plan Your Hosting Provider Has Given to You Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 12: Protection from Email Spoofing Scenario Objectives Introduction to Email Spoofing Method I Hovering the Pointer over the Sender’s Name Method II Analyzing the Header of the Email Method III Check for SPF, DKIM and DMARK Let’s Do It! – Checking for SPF, DKIM and DMARK Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 13: Backup and Encryption Scenario Objectives Introduction to Ransomware Working of Ransomware Attacks Backup and Its Importance Importance of Data Encryption Encrypting Data Using BitLocker Let’s Do It! – Encrypting a Drive Using the BitLocker Encrypting Data Using VeraCrypt Using Anti Ransomware Feature of an Antivirus Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 14: Must-Have Apps for Women and Elderly Scenario Overview Introduction to Emergency Apps How Do These Emergency Apps Work? Recommended Apps for Android Phones Recommended Apps for iPhones Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 15: Penetration Testing Using A Smartphone Scenario Objectives Introduction to Penetration Testing Why Is Penetration Testing Performed? Types of Penetration Testing White-Box Testing Black-Box Testing Gray-Box Testing Phases of Penetration Testing Limited Penetration Testing Using Smartphone Let’s do it! Using the Network Scanner App Using Fing App to Find Open Ports What Is Port? Link to Similar Apps Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 16: P2P Money Transfer Apps and More Case Study Objectives About Peer to Peer (P2P) Money Transfer Apps What Is a QR Code? What to Do to Avoid QR Code Frauds Precautions to Take While Using These P2P Apps Online Shopping Frauds Case Study How to Safeguard Yourself Know Them Compare the Deal Keep Records Read the Fine Prints Free Trial? Use Credit Cards to Make Purchases Matrimonial Frauds Case Study The Modus Operandi How to Identify Fraudsters How to Safeguard Yourself Always Visit a Reputed Matrimonial Website Always Look for Verified Profile Matches Thorough Profile Check Be Cautious of Demand for Money Stay Safe While Meeting in Person Do Not Reveal Your Account Information Conclusion Multiple Choice Questions Answer Key Lab Time Chapter 17: Final Thirty Tips for Online Safety Chapter 18: Reporting a Cybercrime Scenario Objectives Introduction Reporting a Cybercrime Link to Cybercrime Cells/Portals (Internet Police) Websites Further Reading Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.