HOW NOT TO BE A PREY ON THE INTERNET - BOOK
Oh Snap!

Please turn off your ad blocking mode for viewing your site content

HOW NOT TO BE A PREY ON THE INTERNET – BOOK

(1 customer review)

$ 9

The objective of this book is to analyze computer security, from the point of view of the victim, to discover what its weaknesses are in the face of technological changes in the world, above all to know which are the attacks that cybercriminals use the most to steal, extort, spy on or corrupt our information

You are from Colombia buy on AMAZON

Description

SYPNOSIS

We all exist digitally, our bank accounts, the purchases we make online thanks to e-commerce, our profiles on social networks, the chats we send daily, the data collected by companies and the government, knowing this, it is impossible not to think about how to protect our security on the Internet.

This book was written so that non-technical people, professionals and companies, can be introduced to computer security and can navigate through the Web and the Internet safely, explaining how not to become a prey on the Internet with practical exercises.

INDEX

1.INTRODUCTION AND CONCEPTS. 8

1.1. WHAT WE SHOULD PROTECT... 10

1.1.1. Bank accounts or credit cards. 10

1.1.2. Our identities. 10

1.1.3. Passwords. eleven

1.1.4. Conversations. eleven

1.1.5. Photos and videos. 12

1.1.6. Wi-fi keys 13

1.1.7. Any electronic device. 13

1.2. FROM WHOM WE PROTECT US. 14

1.2.1. Black hat hackers. 14

1.2.2. Script kiddies. 14

1.2.3. Relatives. fifteen

1.2.4. Friends. fifteen

1.2.5. Couple. fifteen

1.2.6. Assailants. 16

1.3. DIFFERENCE BETWEEN INTERNET AND WEB.. 16

1.4. PROTOCOLS. 17

  1. KEEP YOUR ACCOUNTS AND SOCIAL NETWORKS SECURE 19

2.1. SECURE PASSWORDS. 19

2.1.1. Tips for a strong password. twenty

2.1.2. Choose your secure password. 22

2.2. TWO-STEP AUTHENTICATION. 28

2.2.1. Activate two-step authentication. 28

23. SECURITY ON SOCIAL NETWORKS. 33

2.3.1. Private accounts and identity theft. 33

2.3.2. Locations. 3. 4

2.3.3. Behavioral-targeted marketing. 35

2.3.4. Tor and DuckDuck Go. 36

2.4. POSSIBLE ATTACKS. 37

2.4.1. Brute force attack. 37

2.4.2. Dictionary attack. 38

2.4.3. Phishing. 38

2.4.4. Keylogger 38

  1. SECURE ONLINE SHOPPING. 40

3.1. MAIN FEARS OF SHOPPING ONLINE. 40

3.2. FIGHT THE FEAR OF SHOPPING ONLINE... 41

3.3. BEWARE OF UNSECURE SITES. 41

3.4. BE CAREFUL WITH DOMAIN NAMES.. 42

3.5. PHISHING BY EMAIL.. 43

3.6. TRACKING NUMBER.. 44

3.7. SHOPPING IN INSTAGRAM STORES.. 44

3.8. WHY ARE PRICES LOWER? Four. Five

3.9. POSSIBLE ATTACKS. Four. Five

3.9.1. Trojans. 46

3.9.2. Spyware. 46

3.9.3. Phishing. 46

3.9.4. Remote keylogger. 47

  1. SECURITY IN LOCAL AND WIRELESS NETWORKS 48

4.1. LAN AND WAN NETWORKS.. 48

4.2. SECURE BROWSING. fifty

4.3. WIRELESS NETWORKS. 51

4.4. WI-FI PROTOCOLS. 51

4.4.1. Know the security of my Wi-Fi network 53

4.5. PEOPLE CONNECTED TO MY NETWORK.. 54

4.6. POSSIBLE ATTACKS. 57

4.6.1. ARP Spoofing. 57

4.6.2. Man attack in the middle. 57

4.6.3. Denial of service attack. 58

4.6.4. Port scanning. 58

4.6.5. OS Finger Printing. 58

  1. SOCIAL ENGINEERING.. 60

5.1. HUMAN VULNERABILITIES. 60

5.2. POSSIBLE SOCIAL ENGINEERING ATTACKS.. 61

5.2.1. Dumpster diving or trashing. 61

5.2.2. Eavesdropping. 62

5.2.3. Phishing. 63

5.2.4. Pïggybacking and tailgating. 63

5.2.5. Fake calls and messages. 64

5.2.6. DeepFakes. 65

5.2.7. Baiting. 66

5.2.8. Bribing. 67

5.2.9. Office snooping. 68

5.2.10. Shoulder surfing. 69

5.2.11. Impersonation. 70

5.2.12. Extortion. 71

5.3. SOCIAL ENGINEERING WITH A POSITIVE LOOK.. 72

  1. DEVICE SECURITY. 73

6.1. MALWARE PROTECTION.. 74

6.2. TYPES OF MALWARE.. 76

6.2.1. RootKit 76

6.2.2. Ransomware. 77

6.2.3. Adware. 77

6.2.4. Worms. 77

6.2.5. Botnet 77

6.2.6. Computer virus. 78

  1. ATTACKS YOU CAN'T AVOID... 79

7.1. EXPLOITS. 79

7.2. ZERO DAY.. 79

7.3. MOST DANGEROUS VULNERABILITIES. 80

7.4. CYBER WAR.. 81

7.5. ZERO DAY EXAMPLE. 82

7.6. COUNTERMEASURES. 83

BIBLIOGRAPHY.. 86

 

1 review for CÓMO NO SER UNA PRESA EN INTERNET – LIBRO

  1. filletchn

    We appreciate your review

Add a review

Your email address will not be published. Required fields are marked *

en_USEN