|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1079007841 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
181215s2018 nju o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d SGP
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781119559634
|
020 |
|
|
|a 1119559634
|
029 |
1 |
|
|a AU@
|b 000067288878
|
035 |
|
|
|a (OCoLC)1079007841
|
050 |
|
4 |
|a TK5105.59
|b .M336 2019
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a McDonough, Bart R.
|
245 |
1 |
0 |
|a Outfox'em :
|b Protecting Yourself and Your Family from Cyber Threats.
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2018.
|
300 |
|
|
|a 1 online resource (304 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright; About the Author; Credits; Acknowledgments; Contents; Foreword; Introduction; Debunking Cybersecurity Myths; Hacking Myths; File Storage and the Cloud Myths; Password Management Myths; Web Browsing Myths; Email Account Myths; Identity Theft Myths; How to Use This Book to Outsmart Bad Actors; Part I: Setting the Stage; Part II: Specific Recommendations; How to Contact the Author; Download; I Setting the Stage; 1 Overview of Cyber Risks; Real Estate Wire Transfer Fraud Prevention Steps; If You're a Victim of Wire Transfer Fraud; Cyber-Risk Statistics
|
505 |
8 |
|
|a Breaches, Cyberattacks, and Hacks-Oh My!Notes; 2 Attackers; The Adversary; Nation-State Attackers; Criminal Organizations; Terrorist Organizations; Bad Actors Who Got Caught; Notes; 3 Attack Targets and Goals; How Attackers Get Your Money; What Attackers Do with Your Money; How Attackers Get Your Credentials; What Attackers Do with Your Credentials; How Attackers Get Your PII; What Attackers Do with Your PII; How Attackers Get Your Computing Resources; What Attackers Do with Your Computing Resources; Notes; 4 Attack Methods; Social Engineering; Phishing; Phishing Attacks; Email Phishing
|
505 |
8 |
|
|a Spear PhishingWhaling; Email Compromise; Clone Phishing; Voice Phishing; SMS Phishing; Pretexting; Malware; Cryptomining Malware and Cryptojacking; Cryptomining; Cryptojacking; Ransomware; Spyware; Scareware; Adware; Trojans; Wi-Fi Network Hacking; Scams; Fake Technical Support; Government Agency Impersonation; The Grandparent Scam; Virtual Kidnapping Extortion; Unpaid Utility Bill Scams; Online Dating Scams; Job Scams; Charity Scams; Robocalling Scams; Notes; 5 Attack Chain; Attack Chain Phases; Links in the Attack Chain; Notes; 6 Attack Vectors; Email; Texting; Phone Calls; Websites
|
505 |
8 |
|
|a SoftwareUSB Key; Wi-Fi; Notes; 7 Brilliance in the Basics; Brilliance 1: Update Your Devices; Brilliance 2: Enable Two-Factor Authentication; Brilliance 3: Use a Password Manager; Brilliance 4: Install and Update Antivirus Software; Brilliance 5: Back Up Your Data; Notes; 8 Mistakes; Being the Source of a Data Breach; Mixing Work and Personal Information; Notes; 9 Incident Response; Falling for a Phishing Attack; Getting Infected with Malware; Getting Infected with Ransomware; Email Compromise; II Specific Recommendations; 10 Protecting Your Identity; Methods of Identity Theft
|
505 |
8 |
|
|a How to Check Whether Your PII Is ExposedIdentity Monitoring Services; Recommendations: Protecting Your Credit Identity; Other Types of Identity Theft; Medical Identity Theft; Recommendations: Protecting Your Medical Identity; Military Personnel Identity Theft; Recommendations: Protecting Your Identity While in the Military; Senior Citizen Identity Theft; Recommendations: Protecting the Identities of Senior Citizens; Notes; 11 Protecting Your Children; The Growing Problem of Child Identity Theft; Recommendations: Protecting Your Child's Identity; Protecting Your Child on the Computer
|
500 |
|
|
|a Smart Toy Risks
|
520 |
|
|
|a The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret. In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn."
|c --Publisher's description.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
758 |
|
|
|i has work:
|a Outfox'em (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCXGpQFVgVjCkjGt3GpQRfC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a McDonough, Bart R.
|t Outfox'em : Protecting Yourself and Your Family from Cyber Threats.
|d Newark : John Wiley & Sons, Incorporated, ©2018
|z 9781119559610
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5612908
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5612908
|
994 |
|
|
|a 92
|b IZTAP
|