About the Author |
|
xvii | |
About the Technical Reviewer |
|
xix | |
Preface |
|
xxi | |
|
Chapter 1 Before We Begin |
|
|
1 | (16) |
|
"How Worried Should I Be?" |
|
|
1 | (6) |
|
|
2 | (3) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (7) |
|
|
9 | (1) |
|
Operating Systems Covered |
|
|
9 | (1) |
|
Navigating the Checklists |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
Tip 1-3 Tip with Variations |
|
|
11 | (2) |
|
Web Addresses and Staying Up to Date |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (2) |
|
Chapter 2 Cybersecurity 101 |
|
|
17 | (50) |
|
|
17 | (6) |
|
|
17 | (3) |
|
Prevention, Detection, and Recovery |
|
|
20 | (3) |
|
|
23 | (1) |
|
|
24 | (8) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Networks (Wired and Wireless) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (6) |
|
|
32 | (4) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (3) |
|
|
41 | (16) |
|
Encryption and Cryptanalysis |
|
|
42 | (6) |
|
|
48 | (3) |
|
Authentication and Message Integrity |
|
|
51 | (5) |
|
Newer Isn't Always Better |
|
|
56 | (1) |
|
|
57 | (5) |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
65 | (2) |
|
|
65 | (1) |
|
Tip 2-2 Know What They Know |
|
|
65 | (2) |
|
Chapter 3 The Three Ups: Back Up, Clean Up, and Update |
|
|
67 | (32) |
|
|
67 | (4) |
|
|
71 | (1) |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
75 | (24) |
|
Operating System Configuration |
|
|
75 | (2) |
|
Tip 3-1 Back Up to an External Drive |
|
|
77 | (7) |
|
Tip 3-2 Back Up to the Cloud |
|
|
84 | (6) |
|
|
90 | (1) |
|
Tip 3-4 Clean Up Your Apps |
|
|
91 | (3) |
|
|
94 | (1) |
|
Tip 3-5 Turn on Auto-Update for Your OS |
|
|
94 | (5) |
|
|
99 | (48) |
|
|
99 | (4) |
|
Understanding Password Strength |
|
|
103 | (7) |
|
|
110 | (2) |
|
Choosing a Master Password |
|
|
112 | (2) |
|
|
114 | (1) |
|
Periodically Changing Passwords |
|
|
115 | (1) |
|
|
116 | (2) |
|
|
118 | (29) |
|
Tip 4-1 Choose a Strong Master Password |
|
|
119 | (1) |
|
Tip 4-2 Get Started with LastPass |
|
|
119 | (2) |
|
Tip 4-3 Install LastPass in Your Web Browser |
|
|
121 | (1) |
|
Tip 4-4 Take the LastPass Tour |
|
|
122 | (2) |
|
Tip 4-5 Install the LastPass App on Your Smartphone |
|
|
124 | (1) |
|
Tip 4-6 Enable Two-Factor Authentication |
|
|
125 | (3) |
|
Tip 4-7 Add Passwords to LastPass |
|
|
128 | (3) |
|
Tip 4-8 Use LastPass to Fill in Passwords |
|
|
131 | (4) |
|
Tip 4-9 Disable Password Saving on Your Browser |
|
|
135 | (1) |
|
Tip 4-10 Delete Saved Passwords from Your Browser |
|
|
136 | (1) |
|
Tip 4-11 Store Credit Cards in LastPass |
|
|
137 | (1) |
|
Tip 4-12 Perform a Security Check in LastPass |
|
|
137 | (1) |
|
Tip 4-13 Generate Strong Passwords for Key Accounts |
|
|
138 | (3) |
|
Tip 4-14 Generate and Store Offline Passwords |
|
|
141 | (1) |
|
Tip 4-15 Create Some One-Time Passwords |
|
|
142 | (2) |
|
Tip 4-16 Disallow LastPass Login from Foreign Countries |
|
|
144 | (3) |
|
Chapter 5 Computer Security |
|
|
147 | (60) |
|
|
147 | (1) |
|
|
148 | (2) |
|
iCloud and Microsoft Accounts |
|
|
150 | (2) |
|
Built-in Security Features |
|
|
152 | (3) |
|
The Pros and Cons of Antivirus Software |
|
|
155 | (1) |
|
How to Properly Delete a File |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (49) |
|
Tip 5-1 Choose a New Computer: Think Different |
|
|
159 | (1) |
|
Tip 5-2 Require Passwords for Computer Accounts |
|
|
159 | (6) |
|
Tip 5-3 Create a Separate Admin Account |
|
|
165 | (15) |
|
Tip 5-4 Install Free Antivirus Software |
|
|
180 | (5) |
|
Tip 5-5 Restrict Access to Important Files |
|
|
185 | (2) |
|
Tip 5-6 Turn on Disk Encryption |
|
|
187 | (5) |
|
Tip 5-7 Encrypt Your Backups (Mac OS Only) |
|
|
192 | (3) |
|
Tip 5-8 Securely Erase Sensitive Files |
|
|
195 | (4) |
|
Tip 5-9 Prepare a Computer for Sale, Donation, or Recycle |
|
|
199 | (2) |
|
Tip 5-10 Set Up Find My Mac (Mac OS Only) |
|
|
201 | (1) |
|
Tip 5-11 Don't Trust Other Computers |
|
|
202 | (1) |
|
Tip 5-12 Avoid Strange USB Devices and Ports |
|
|
202 | (1) |
|
Tip 5-13 Don't Use Adobe Reader to Read PDF Files |
|
|
203 | (1) |
|
Tip 5-14 Unplug or Cover Webcams When Not in Use |
|
|
204 | (1) |
|
Tip 5-15 Beware Cold Calls for Computer Support |
|
|
204 | (1) |
|
Tip 5-16 Buy a Paper Shredder |
|
|
204 | (3) |
|
|
207 | (22) |
|
|
207 | (3) |
|
|
210 | (1) |
|
|
211 | (2) |
|
|
213 | (2) |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
218 | (11) |
|
Tip 6-1 Get Your Own Modem |
|
|
220 | (1) |
|
Tip 6-2 Get Your Own Wi-Fi Router |
|
|
220 | (1) |
|
Tip 6-3 Lock Down Your Wi-Fi |
|
|
221 | (1) |
|
|
221 | (1) |
|
Tip 6-5 Set a Strong Password for Your Router Admin Page |
|
|
221 | (1) |
|
Tip 6-6 Change Your Default SSID |
|
|
222 | (1) |
|
Tip 6-7 Disable External Admin |
|
|
222 | (1) |
|
Tip 6-8 Disable External Services |
|
|
223 | (1) |
|
Tip 6-9 Use ShieldsUp to Check for Vulnerabilities |
|
|
223 | (1) |
|
Tip 6-10 Enable and Use the Guest Network |
|
|
224 | (1) |
|
Tip 6-11 Put "Internet of Things" Devices on the Guest Net |
|
|
224 | (1) |
|
Tip 6-12 Register Your Devices |
|
|
224 | (1) |
|
Tip 6-13 Update Your Router's Firmware |
|
|
225 | (1) |
|
Tip 6-14 Disable Auto-Connect to Wi-Fi |
|
|
225 | (1) |
|
Tip 6-15 Turn Off Your ISP's Wi-Fi |
|
|
226 | (1) |
|
|
226 | (3) |
|
Chapter 7 Practice Safe Surfing |
|
|
229 | (48) |
|
|
234 | (10) |
|
|
235 | (5) |
|
|
240 | (4) |
|
On the Ethics of Ad Blocking |
|
|
244 | (2) |
|
|
246 | (2) |
|
|
248 | (2) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (2) |
|
|
252 | (25) |
|
|
252 | (1) |
|
Tip 7-2 Configure the Security and Privacy Settings on Firefox |
|
|
253 | (6) |
|
Tip 7-3 Remove All Unnecessary Add-ons |
|
|
259 | (2) |
|
Tip 7-4 Change the Default Search Option to DuckDuckGo |
|
|
261 | (1) |
|
Tip 7-5 Install Security and Privacy Add-ons |
|
|
261 | (2) |
|
Tip 7-6 Always Go to the Source for Downloads |
|
|
263 | (1) |
|
Tip 7-7 Be Careful on "Shady" Sites |
|
|
263 | (1) |
|
Tip 7-8 Beware of Pop-Ups Offering/Requiring Plugins |
|
|
264 | (1) |
|
Tip 7-9 Opt Out Where You Can |
|
|
264 | (1) |
|
Tip 7-10 Use Private Browsing |
|
|
265 | (1) |
|
Tip 7-11 Change Your DNS Provider on Your Wi-Fi Router |
|
|
265 | (2) |
|
Tip 7-12 Change Your DNS Provider on Your Laptop |
|
|
267 | (7) |
|
Tip 7-13 Use DNS Over HTTPS (DoH) |
|
|
274 | (3) |
|
Chapter 8 Secure Communication |
|
|
277 | (28) |
|
|
277 | (2) |
|
|
279 | (2) |
|
Spam and Spoofed Messages |
|
|
281 | (3) |
|
How to Recognize a Fake Email |
|
|
284 | (1) |
|
"So How Do I Communicate Securely?" |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
288 | (17) |
|
Tip 8-1 Create Email Accounts for Public and Private Uses |
|
|
288 | (1) |
|
Tip 8-2 Use an Encrypted Email Service |
|
|
288 | (1) |
|
Tip 8-3 Send Sensitive Info Securely |
|
|
289 | (6) |
|
Tip 8-4 Send Files Securely Using the Web |
|
|
295 | (3) |
|
Tip 8-5 Read Your Email Using the Web |
|
|
298 | (1) |
|
Tip 8-6 Don't Abandon Unused Email Accounts |
|
|
298 | (1) |
|
Tip 8-7 Keep an Eye on Your Account Activity Info |
|
|
299 | (1) |
|
Tip 8-8 Don't Forward Something Without Verifying It First |
|
|
300 | (1) |
|
Tip 8-9 Don't Click Links, If Possible |
|
|
300 | (1) |
|
Tip 8-10 Don't Open Email Attachments, If Possible |
|
|
301 | (1) |
|
Tip 8-11 Check Files Before Sending |
|
|
301 | (1) |
|
Tip 8-12 Deal Properly with Spam |
|
|
301 | (1) |
|
Tip 8-13 Use Secure Messaging Apps |
|
|
302 | (1) |
|
Tip 8-14 Secure Your Video Chats |
|
|
302 | (3) |
|
Chapter 9 Online Accounts and Social Media |
|
|
305 | (30) |
|
Banking and Shopping Online |
|
|
305 | (2) |
|
Credit Bureaus and Identity Theft |
|
|
307 | (1) |
|
|
308 | (2) |
|
|
310 | (2) |
|
|
312 | (1) |
|
|
313 | (22) |
|
Tip 9-1 Lock Down Your Apple/Microsoft Accounts |
|
|
313 | (6) |
|
Tip 9-2 Use Throwaway Email Accounts |
|
|
319 | (2) |
|
Tip 9-3 Use Credit Cards Online (Not Debit Cards) |
|
|
321 | (1) |
|
Tip 9-4 Use Virtual Credit Card Numbers |
|
|
321 | (1) |
|
Tip 9-5 Give Your Credit Card Company a Heads-Up |
|
|
322 | (1) |
|
Tip 9-6 Set Up Restrictions on Your Financial Accounts |
|
|
323 | (1) |
|
Tip 9-7 Turn On Account Alerts |
|
|
323 | (1) |
|
Tip 9-8 Freeze Your Credit |
|
|
323 | (1) |
|
Tip 9-9 Use Private Cloud Storage Services |
|
|
324 | (1) |
|
Tip 9-10 Don't Broadcast Your Travel Plans |
|
|
325 | (1) |
|
Tip 9-11 Scrub Your Files Before Sharing |
|
|
325 | (1) |
|
Tip 9-12 Don't Sign In Using Facebook, Google, Etc |
|
|
326 | (1) |
|
Tip 9-13 Don't Divulge Too Much Personal Info Online |
|
|
327 | (1) |
|
Tip 9-14 Be Wary of Using DNA Services |
|
|
327 | (1) |
|
Tip 9-15 Account Recovery Questions: Lie |
|
|
328 | (1) |
|
Tip 9-16 Limit Who Can See Your Stuff |
|
|
328 | (1) |
|
Tip 9-17 Don't Give Out Your Email Credentials |
|
|
329 | (1) |
|
Tip 9-18 Enable Two-Factor Auth Wherever You Can |
|
|
329 | (1) |
|
Tip 9-19 Read the Terms of Service (or Not) |
|
|
330 | (1) |
|
Tip 9-20 Know What They Know |
|
|
330 | (1) |
|
Tip 9-21 Lock Down Your Social Media Accounts |
|
|
331 | (1) |
|
Tip 9-22 Close Accounts You Don't Use |
|
|
332 | (1) |
|
Tip 9-23 Delete Your Facebook History |
|
|
333 | (1) |
|
Tip 9-24 Use Privacy-Respecting Alternatives |
|
|
333 | (1) |
|
Tip 9-25 Avoid TikTok Entirely |
|
|
334 | (1) |
|
Chapter 10 Parental Guidance |
|
|
335 | (16) |
|
The Internet Is Everywhere |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (12) |
|
Tip 10-1 Create a Dedicated Account for Each Child |
|
|
339 | (1) |
|
Tip 10-2 Use Parental Controls for Young Children |
|
|
339 | (1) |
|
Tip 10-3 Creating Email Accounts for Children |
|
|
340 | (7) |
|
Tip 10-4 Research Before Allowing Your Kids to Sign Up |
|
|
347 | (1) |
|
Tip 10-5 Teach Your Kids to Protect Their Identities |
|
|
347 | (1) |
|
Tip 10-6 Be Able to Access All Accounts and Devices |
|
|
348 | (1) |
|
Tip 10-7 Honor the Age Restrictions |
|
|
348 | (1) |
|
Tip 10-8 Friends Must First Be Met in Person |
|
|
348 | (1) |
|
Tip 10-9 Lock Down Chromebook Settings |
|
|
348 | (1) |
|
Tip 10-10 Remember the Golden Rule |
|
|
349 | (1) |
|
Tip 10-11 Keep Computers in a Common Area of the House |
|
|
349 | (1) |
|
Tip 10-12 Use Family Friendly DNS |
|
|
349 | (1) |
|
Tip 10-13 Use Device Tracking (Judiciously and Fairly) |
|
|
350 | (1) |
|
Tip 10-14 Create a Contract for Your Kids |
|
|
350 | (1) |
|
Tip 10-15 Parental Resources |
|
|
350 | (1) |
|
Chapter 11 Don't Be a Smartphone Dummy |
|
|
351 | (24) |
|
iOS Is More Secure Than Android |
|
|
351 | (1) |
|
iOS Is More Private Than Android |
|
|
352 | (1) |
|
|
353 | (2) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (17) |
|
Tip 11-1 Back Up Your Phone |
|
|
358 | (3) |
|
Tip 11-2 Keep Your Device Up to Date |
|
|
361 | (1) |
|
Tip 11-3 Lock Your Device |
|
|
362 | (1) |
|
Tip 11-4 Don't Use Biometric Locks for Sensitive Stuff |
|
|
362 | (1) |
|
Tip 11-5 Enabling Lockdown Mode |
|
|
363 | (1) |
|
Tip 11-6 Restrict Application Permissions |
|
|
364 | (1) |
|
Tip 11-7 Limit Ad Tracking |
|
|
365 | (1) |
|
Tip 11-8 Remove Unused Apps |
|
|
365 | (1) |
|
Tip 11-9 Enable (Self) Tracking |
|
|
366 | (1) |
|
Tip 11-10 Use Firefox Browser |
|
|
367 | (1) |
|
Tip 11-11 Avoid Cheap Android Phones |
|
|
367 | (1) |
|
Tip 11-12 Use Secure Messaging Apps |
|
|
367 | (1) |
|
Tip 11-13 Install (and Use) a Mobile VPN |
|
|
368 | (1) |
|
Tip 11-14 Disable Wi-Fi Auto-Connect |
|
|
369 | (1) |
|
Tip 11-15 Know Your Rights When You Travel |
|
|
369 | (1) |
|
Tip 11-16 Don't Hack Your Device |
|
|
370 | (1) |
|
Tip 11-17 Disable Bluetooth and NFC When You Can |
|
|
370 | (1) |
|
Tip 11-18 Erase Your Device Before Getting Rid of It |
|
|
370 | (2) |
|
Tip 11-19 Enable Medical ID |
|
|
372 | (1) |
|
Tip 11-20 Use a USB Condom |
|
|
373 | (2) |
|
|
375 | (18) |
|
|
375 | (5) |
|
Tip 12-1 Email Account Is Hacked |
|
|
375 | (2) |
|
Tip 12-2 Website Password Breach |
|
|
377 | (1) |
|
Tip 12-3 You Suspect You Have a Virus |
|
|
377 | (1) |
|
Tip 12-4 You've Got Ransomware! |
|
|
378 | (1) |
|
Tip 12-5 Restoring a Lost or Messed-Up File |
|
|
379 | (1) |
|
|
380 | (3) |
|
|
380 | (1) |
|
Tip 12-7 Add a Backup to Your Safety Deposit Box |
|
|
380 | (1) |
|
Tip 12-8 Save Your Passwords Somewhere Safe |
|
|
380 | (1) |
|
Tip 12-9 Ensure Access to Two-Factor Device |
|
|
381 | (1) |
|
Tip 12-10 Appoint a "Digital Executor" |
|
|
381 | (1) |
|
Tip 12-11 Stop ID Theft After Death |
|
|
382 | (1) |
|
Gold Stars and Tinfoil Hats |
|
|
383 | (10) |
|
Tip 12-12 Install NoScript |
|
|
383 | (1) |
|
Tip 12-13 Install Haven on an Old Android Phone |
|
|
383 | (1) |
|
Tip 12-14 Add a Dedicated Guest Wi-Fi Router |
|
|
384 | (1) |
|
Tip 12-15 Install Little Snitch (Mac OS Only) |
|
|
384 | (1) |
|
Tip 12-16 Use Top-Shelf Security and Privacy Tools |
|
|
385 | (1) |
|
Tip 12-17 Install Custom Wi-Fi Router Software |
|
|
385 | (1) |
|
Tip 12-18 Install and Use PGP |
|
|
386 | (1) |
|
Tip 12-19 Use Tor to Protect Your Identity |
|
|
386 | (1) |
|
Tip 12-20 Need to Blow the Whistle? Use SecureDrop |
|
|
386 | (1) |
|
Tip 12-21 Set Up a Virtual Machine |
|
|
387 | (1) |
|
Tip 12-22 Use a Dedicated Secure Computer |
|
|
387 | (1) |
|
Tip 12-23 Sandbox Your Windows Apps |
|
|
388 | (1) |
|
Tip 12-24 Shut Your Pi Hole |
|
|
388 | (1) |
|
Tip 12-25 Use Open Source Hardware |
|
|
389 | (1) |
|
|
389 | (1) |
|
Tip 12-27 Completely and Securely Erase a Hard Drive |
|
|
390 | (1) |
|
Tip 12-28 Roll the Dice for Security |
|
|
390 | (3) |
|
Chapter 13 Parting Thoughts |
|
|
393 | (8) |
|
|
393 | (1) |
|
|
394 | (1) |
|
Don't Take This Lying Down |
|
|
395 | (1) |
|
|
396 | (5) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
Glossary |
|
401 | (4) |
Index |
|
405 | |