𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

The Cybersecurity Self-Help Guide

✍ Scribed by Arun Soni


Publisher
CRC Press
Year
2021
Tongue
English
Leaves
227
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online.

Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic.

This bookΒ is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers.


Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Contents
Preface
Introduction: The World of Cybercrime
The World of Cybercrime
Understanding Various Types of Cybercrimes
Hacking
Malware
Spoofing
Identity Theft
Phishing
Pharming
Web Jacking
Cyberstalking/Cyberbullying
A Denial-of-Service (DoS) Attack
Social Engineering
Multiple Choice Questions
Answer key
Chapter 1: All About IP Addresses
Scenario
Objectives
Introduction to IP Address
About the Network Interface Card
Understanding Public and Private IP Addresses
Public IP
Private IP
Network Address Translation
About Dynamic Host Configuration Protocol (DHCP)
Understanding IPv4 and IPv6 Addressing System
IPv4 Address
Network Part
Host Part
IPv6 Address
About the Domain Name System (DNS)
Understanding Static and Dynamic IP Addresses
Static IP Address
Dynamic IP Address
Tracking an IP Address
Let’s Do It! – Tracking Yourself
Let’s Do It! – Tracking Someone Else from the IP Address
Similar Websites to Track IP Address
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 2: Router Security
Scenario
Objectives
Introduction to Default Password Vulnerabilities
Modem
Router
What Do We Have in Our Homes?
Types of Routers
Wired Routers
Wireless Routers
Virtual Routers
Default Passwords
About Phishing Websites
Main Rules for Protecting a Wireless Router
About Media Access Control Address (MAC)
Methods to Keep Your Router Safe
Updating the Router’s Firmware
Turning Off Unneeded Services
Setting Stronger Passwords
Let’s Do It! – Checking the Router Security
Probing Further
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 3: Applying 2-Factor Authentication (2-FA)
Scenario
Objectives
Introduction to Password Capturing
Password Capturing Methods
Weak Passwords
Dictionary Attack
Brute Force Attack
Keylogger
Phishing Pages
How to Defeat All These Attacks?
What Is 2-FA
Let’s Do It! – Applying 2-FA to Your Gmail Account
Google Prompt Method
Verifying
Setting Up 2-FA for Your WhatsApp Account
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 4: Has My Email Been Hacked?
Scenario 1
Scenario 2
Objectives
Introduction to Log-in Activities
Remove Third-Party Access
In the Case of Hotmail/Outlook.com Service Provider
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 5: Implementing Online Parental Control
Scenario
Overview
Introduction to Cyber Threats to Children
Child Pornography
Cyberstalking
Cyberbullying
Hacking
Parental Controls
Google Safe Search
Google Family Link App for Parents
Let’s Do It! – Steps to Set Up Google Family Link for Parents
Device Compatibility
For Kids and Teens
For Parents
Changing DNS in Your Router
Let’s Do It! – Steps to Add These DNS Servers to your Router
More Companies That Provide Family-Friendly DNS Servers
CleanBrowsing
SafeSurfer
DNS for Family
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 6: The Golden Rule to Be on Social Media
Scenario
Objectives
Introduction to Watermarking
What Is a Watermark?
Let’s Do It! – Downloading and Using uMark Software
Some Other Websites for Watermarking
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 7: Smartphone Security/Finding Your Lost Phone
Scenario
Objectives
Introduction to Smartphone Security
Smartphone Security
Authentication in Smartphones
Passwords
PIN Number
Pattern Lock
Fingerprint Scanner
Facial Recognition
Tracking Your Phone
Let’s Do It! – Tracking Your Missing Android Phone
Let’s Do It! – Tracking Your Missing iPhone
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 8: All about Proxy and VPN
Scenario
Objectives
Introduction to Anonymity
Proxy
VPN
Pros and Cons of Using a VPN
Pros of Using a VPN
Cons of Using a VPN
Setting Up a VPN in an Android Smartphone
Let’s Do It! – Getting a VPN on Your Android Phone
Setting Up a Personal VPN in a Windows 10 PC
Let’s Do It! – A Quick Guide to Setting Up a VPN in a Windows 10 PC
Link to Other Similar VPN
Some Points to Consider before Selecting a VPN
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 9: Collecting the Digital EviVIdence
Scenario
Overview
Introduction to Importance of Digital Evidence
Let’s Do It! – Producing an Email/Web Page/Video as Digital Evidence
Producing a WhatsApp Chat as Digital Evidence
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 10: Debit/Credit Card Security
Scenario
Overview
Introduction to Skimmers
How Bad Actors Capture Your Card Details and ATM PIN
What Is EMV?
Protecting Yourself from Such Frauds
Multiple Choice Questions
Answer Key
Lab Time
Chapter 11: Website Hacking and Security Implementation
Scenario
Overview
Introduction to Website Hacking
Website Vulnerability and Threats
SQL Injection
XSS
DoS and DDoS
Brute Force Attack
Dictionary Attack
Website Security
Purchasing a Hosting Service
Take Care of the Hosting Plan You Choose
SSL Certificates
Software Updates
Website Scanning
Web-Application Firewall
Stop Using Public Computers/Wi-Fi to Access the Website Dashboard
Login Attempts to Be Limited
Making a Backup of Your Website
Tracking Website Logs Regularly
Purchasing Protection, Monitoring and Repair Service
Let’s Do It! – Checking Which Hosting Plan Your Hosting Provider Has Given to You
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 12: Protection from Email Spoofing
Scenario
Objectives
Introduction to Email Spoofing
Method I
Hovering the Pointer over the Sender’s Name
Method II
Analyzing the Header of the Email
Method III
Check for SPF, DKIM and DMARK
Let’s Do It! – Checking for SPF, DKIM and DMARK
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 13: Backup and Encryption
Scenario
Objectives
Introduction to Ransomware
Working of Ransomware Attacks
Backup and Its Importance
Importance of Data Encryption
Encrypting Data Using BitLocker
Let’s Do It! – Encrypting a Drive Using the BitLocker
Encrypting Data Using VeraCrypt
Using Anti Ransomware Feature of an Antivirus
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 14: Must-Have Apps for Women and Elderly
Scenario
Overview
Introduction to Emergency Apps
How Do These Emergency Apps Work?
Recommended Apps for Android Phones
Recommended Apps for iPhones
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 15: Penetration Testing Using A Smartphone
Scenario
Objectives
Introduction to Penetration Testing
Why Is Penetration Testing Performed?
Types of Penetration Testing
White-Box Testing
Black-Box Testing
Gray-Box Testing
Phases of Penetration Testing
Limited Penetration Testing Using Smartphone
Let’s do it! Using the Network Scanner App
Using Fing App to Find Open Ports
What Is Port?
Link to Similar Apps
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 16: P2P Money Transfer Apps and More
Case Study
Objectives
About Peer to Peer (P2P) Money Transfer Apps
What Is a QR Code?
What to Do to Avoid QR Code Frauds
Precautions to Take While Using These P2P Apps
Online Shopping Frauds
Case Study
How to Safeguard Yourself
Know Them
Compare the Deal
Keep Records
Read the Fine Prints
Free Trial?
Use Credit Cards to Make Purchases
Matrimonial Frauds
Case Study
The Modus Operandi
How to Identify Fraudsters
How to Safeguard Yourself
Always Visit a Reputed Matrimonial Website
Always Look for Verified Profile Matches
Thorough Profile Check
Be Cautious of Demand for Money
Stay Safe While Meeting in Person
Do Not Reveal Your Account Information
Conclusion
Multiple Choice Questions
Answer Key
Lab Time
Chapter 17: Final Thirty Tips for Online Safety
Chapter 18: Reporting a Cybercrime
Scenario
Objectives
Introduction
Reporting a Cybercrime
Link to Cybercrime Cells/Portals (Internet Police) Websites
Further Reading
Index


πŸ“œ SIMILAR VOLUMES


cover
✍ Garrett, John πŸ“‚ Library πŸ“… 2000 πŸ› [Oakland, CA] : New Harbinger Publications 🌐 English

Techniques and home remedies to relieve pain and strengthen the knee

The Chiropractor's Self-Help Book: The U
✍ Leonard McGill πŸ“‚ Library πŸ“… 2015 πŸ› Indialantic Enterprises 🌐 English

The Chiropractor's Self-Help book is the best-selling Chiropractic self-help book of all time, having been published in the US, Canada, England and Russia. Containing over 100 photos and easy-to-follow instructions, with this book you'll be able to: Get healthy as quickly as possible. Get rid o

The Chiropractor's Self-Help Book: The U
✍ McGill, Leonard πŸ“‚ Library πŸ“… 2015 πŸ› Indialantic Enterprises 🌐 English

The Chiropractor's Self-Help book is the best-selling Chiropractic self-help book of all time, having been published in the US, Canada, England and Russia. Containing over 100 photos and easy-to-follow instructions, with this book you'll be able to: Get healthy as quickly as possible. Get rid o

The Chiropractor's Self-Help Book: The U
✍ McGill, Leonard πŸ“‚ Library πŸ“… 2015 πŸ› Indialantic Enterprises 🌐 English

The Chiropractor's Self-Help book is the best-selling Chiropractic self-help book of all time, having been published in the US, Canada, England and Russia. Containing over 100 photos and easy-to-follow instructions, with this book you'll be able to: Get healthy as quickly as possible. Get rid o