Preface |
|
ix | |
Acknowledgments |
|
xiii | |
Introduction |
|
xv | |
|
|
1 | (13) |
|
Origins of the Fourth Amendment |
|
|
1 | (2) |
|
Evolution of Privacy Protections for New Technologies |
|
|
3 | (5) |
|
Legal Protection of Electronic Privacy Today |
|
|
8 | (1) |
|
The Expectation of Privacy |
|
|
8 | (2) |
|
Justice Louis Brandeis, Supreme Court Justice |
|
|
10 | (2) |
|
|
12 | (2) |
|
2 Computer Viruses: Invisible Threats to Privacy |
|
|
14 | (17) |
|
Types of Computer Viruses |
|
|
15 | (2) |
|
(In)famous Computer Viruses |
|
|
17 | (3) |
|
|
20 | (2) |
|
Why Do People Spread Viruses? |
|
|
22 | (1) |
|
The Battle against Viruses |
|
|
23 | (4) |
|
Robert Tappan Morris, Programmer of an Early Virus |
|
|
27 | (1) |
|
|
28 | (3) |
|
3 Spyware: Software Snooping on Your Private Data |
|
|
31 | (15) |
|
|
32 | (3) |
|
|
35 | (1) |
|
|
36 | (2) |
|
How to Protect Yourself against Spyware |
|
|
38 | (2) |
|
What to Do if Your Computer Is Infected |
|
|
40 | (2) |
|
Steve Gibson, Founder of Gibson Research Corporation |
|
|
42 | (2) |
|
|
44 | (2) |
|
4 Phishing and Social Engineering: Confidence Games Go Online |
|
|
46 | (12) |
|
Confidence Games: The Prehistory of Phishing |
|
|
46 | (3) |
|
|
49 | (1) |
|
The Technology of Phishing |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
52 | (1) |
|
How to Protect against Phishing |
|
|
53 | (1) |
|
Kevin Mitnick, Computer Security Consultant, Reformed Hacker |
|
|
54 | (3) |
|
|
57 | (1) |
|
5 Your Personal Information Online: Everyone Is a Public Figure Now |
|
|
58 | (13) |
|
The Permanence of Online Records |
|
|
58 | (3) |
|
Offline Records Go Online |
|
|
61 | (1) |
|
Controlling Access to Online Information |
|
|
62 | (1) |
|
Online Data: More Up-to-Date and Obsolete Than Ever |
|
|
63 | (1) |
|
Employers and Social Networking Sites |
|
|
63 | (1) |
|
Examples of Ways in Which Information Becomes Available Online |
|
|
64 | (2) |
|
Robert Ellis Smith, Privacy Advocate |
|
|
66 | (2) |
|
|
68 | (3) |
|
6 Identity Theft: Protecting Oneself against Imposters |
|
|
71 | (14) |
|
Protecting One's Identity |
|
|
73 | (2) |
|
Malware, Social Engineering, and Identity Theft |
|
|
75 | (1) |
|
Prominent Examples of Identity Theft |
|
|
76 | (1) |
|
The Children's Online Privacy Protection Act (COPPA) |
|
|
77 | (1) |
|
Not All Web Sites Are Created Equal |
|
|
78 | (1) |
|
Password Creation and Management |
|
|
79 | (3) |
|
Marc Rotenberg, Privacy Advocate |
|
|
82 | (2) |
|
|
84 | (1) |
|
7 Keeping Your Data Secure: The Best Offense Is a Good Defense |
|
|
85 | (19) |
|
|
85 | (2) |
|
|
87 | (1) |
|
Encrypting Data on Computers and Online |
|
|
87 | (2) |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
92 | (2) |
|
Laptops, Smart Phones, and Flash Drives: Data on the Move |
|
|
94 | (1) |
|
|
95 | (2) |
|
Philip Zimmermann, Author of Pretty Good Privacy Encryption Software |
|
|
97 | (3) |
|
The Internet as Soapbox and Big Brother |
|
|
100 | (2) |
|
|
102 | (2) |
|
8 Databases, Privacy, and Security: Monitoring the Online You |
|
|
104 | (22) |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
111 | (1) |
|
Reidentification: The Challenge of Keeping Data Anonymous |
|
|
112 | (3) |
|
|
115 | (3) |
|
|
118 | (4) |
|
Simson L. Garfinkel, Author, Database Security Expert |
|
|
122 | (3) |
|
|
125 | (1) |
Chronology |
|
126 | (4) |
Glossary |
|
130 | (7) |
Further Resources |
|
137 | (12) |
Index |
|
149 | |