Limit search to available items
Book Cover
E-book
Author Soni, Arun

Title The Cybersecurity Self-Help Guide
Published Milton : Taylor & Francis Group, 2021

Copies

Description 1 online resource (227 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- Introduction: The World of Cybercrime -- The World of Cybercrime -- Understanding Various Types of Cybercrimes -- Hacking -- Malware -- Spoofing -- Identity Theft -- Phishing -- Pharming -- Web Jacking -- Cyberstalking/Cyberbullying -- A Denial-of-Service (DoS) Attack -- Social Engineering -- Multiple Choice Questions -- Answer key -- Chapter 1: All About IP Addresses -- Scenario -- Objectives -- Introduction to IP Address -- About the Network Interface Card -- Understanding Public and Private IP Addresses
Public IP -- Private IP -- Network Address Translation -- About Dynamic Host Configuration Protocol (DHCP) -- Understanding IPv4 and IPv6 Addressing System -- IPv4 Address -- Network Part -- Host Part -- IPv6 Address -- About the Domain Name System (DNS) -- Understanding Static and Dynamic IP Addresses -- Static IP Address -- Dynamic IP Address -- Tracking an IP Address -- Let's Do It! -- Tracking Yourself -- Let's Do It! -- Tracking Someone Else from the IP Address -- Similar Websites to Track IP Address -- Conclusion -- Multiple Choice Questions -- Answer Key -- Lab Time
Chapter 2: Router Security -- Scenario -- Objectives -- Introduction to Default Password Vulnerabilities -- Modem -- Router -- What Do We Have in Our Homes? -- Types of Routers -- Wired Routers -- Wireless Routers -- Virtual Routers -- Default Passwords -- About Phishing Websites -- Main Rules for Protecting a Wireless Router -- About Media Access Control Address (MAC) -- Methods to Keep Your Router Safe -- Updating the Router's Firmware -- Turning Off Unneeded Services -- Setting Stronger Passwords -- Let's Do It! -- Checking the Router Security -- Probing Further -- Conclusion
Multiple Choice Questions -- Answer Key -- Lab Time -- Chapter 3: Applying 2-Factor Authentication (2-FA) -- Scenario -- Objectives -- Introduction to Password Capturing -- Password Capturing Methods -- Weak Passwords -- Dictionary Attack -- Brute Force Attack -- Keylogger -- Phishing Pages -- How to Defeat All These Attacks? -- What Is 2-FA -- Let's Do It! -- Applying 2-FA to Your Gmail Account -- Google Prompt Method -- Verifying -- Setting Up 2-FA for Your WhatsApp Account -- Conclusion -- Multiple Choice Questions -- Answer Key -- Lab Time -- Chapter 4: Has My Email Been Hacked? -- Scenario 1
Scenario 2 -- Objectives -- Introduction to Log-in Activities -- Remove Third-Party Access -- In the Case of Hotmail/Outlook.com Service Provider -- Conclusion -- Multiple Choice Questions -- Answer Key -- Lab Time -- Chapter 5: Implementing Online Parental Control -- Scenario -- Overview -- Introduction to Cyber Threats to Children -- Child Pornography -- Cyberstalking -- Cyberbullying -- Hacking -- Parental Controls -- Google Safe Search -- Google Family Link App for Parents -- Let's Do It! -- Steps to Set Up Google Family Link for Parents -- Device Compatibility -- For Kids and Teens
Notes Description based upon print version of record
For Parents
Form Electronic book
ISBN 9781000454925
1000454924