Privacy Online: The Practical Privacy Guide For Anyone
()
About this ebook
Nowadays, everyone takes security as a serious matter: individuals, companies, institutions, organizations, and government. Everyone cares about privacy; well, I hope you too. At some point, people usually do not want information to be released for various reasons; for instance, what will happen if a naïve government employee queries a government database and messes up sending user Social Security Number to someone? Or maybe what if an attacker listens to communications between two hosts (assuming 2 diplomatic agencies)? Let’s even assume at home: you have some children browsing the web, using computers or tablets for games, streaming songs or downloading videos, all kinds of stuffs. Children like to do things online; however, they are unaware of what is out there and do not understand the risk they are taking online. So, it is your responsibility to educate and help them securing their online browsing in order to be safe. To triumph, this book comes handy to everyone who needs privacy; in other words, it makes easier for anyone to understand step by step the best practices for everyday use of Internet: beginner, medium, advanced, and addicted of Internet. Today, Internet is our home, our office, and business.
The question of security of information, privacy and confidentiality seems to be more than a personal interest. It has become a big concern for parents, administrations, institutions, corporations (public or private), agencies, etc. In a multi-user environment, we use what known as encryption to secure the communication over (probably an insecure) channel. The question: is that enough? This book explains online privacy issues and provides methods and tips to be safe from online attacks and thefts. You don’t need to be experts to understand and use this book.
Roger Fassinou
Hello I am Roger, currently living in Chicago, United States. I am an Ethical Hacker and Web Applications Penetration Tester, also a Professional Websites Developer and Senior Android Applications Developer.
Related to Privacy Online
Related ebooks
Zero Trust Proactive Cyber Security For Everyone: Protecting America Through Technology Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsOnline Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet Rating: 4 out of 5 stars4/5Step Up, Step Out, And Shine: 2nd Edition Rating: 0 out of 5 stars0 ratingsRussian Cyber Activity Rating: 0 out of 5 stars0 ratingsAI Mega Profits Unleashing Extreme Bestsellers Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsGINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Rating: 0 out of 5 stars0 ratingsOnline Safety: Scams, SPAM, Viruses and Clouds Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsYour Safety and Privacy Online: The CIA and NSA Rating: 0 out of 5 stars0 ratingsCyber Smarts for Students Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsFamily Net Safety Guide Rating: 0 out of 5 stars0 ratingsHow Not To Use Your Smartphone Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5Security in the Digital World Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsDarknet: Into the Deepest Mysteries of the Internet Rating: 0 out of 5 stars0 ratingsTor and the Deep Web Rating: 0 out of 5 stars0 ratingsDigital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsWhat is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5How To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsThe Personal Digital Resilience Handbook: An essential guide to safe, secure and robust use of everyday technology Rating: 0 out of 5 stars0 ratingsYou and the Internet of Things: A Practical Guide to Understanding and Integrating the IoT into Your Daily Life Rating: 0 out of 5 stars0 ratings
Security For You
IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsApple Card and Apple Pay: A Ridiculously Simple Guide to Mobile Payments Rating: 0 out of 5 stars0 ratingsBlockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5
Reviews for Privacy Online
0 ratings0 reviews
Book preview
Privacy Online - Roger Fassinou
Privacy online: the practical privacy guide for anyone
Roger Fassinou
Published by Roger fassinou at Smashwords
Copyright 2015 Roger Fassinou
Smashwords Edition, License Note
This eBook is licensed for your personal enjoyment only. This eBook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to your favorite eBook retailer and purchase your own copy. Thank you for respecting the hard work of this author.
Table of Contents
Preface
Abstract
Chapter 1-The Internet of 21st century
Section 1-The layers of security
Chapter 2-Before landing on Internet
Section 1-Select your browser
Section 2-Configure your browser
Section 3-Advanced settings (for more protection)
Chapter 3-While on Internet
Section 1-The Dos (always do that)
Section 2-The Don’t (Never do that)
Chapter 4-After exiting Internet
Chapter 5-Passwords
Section 1-Why do you need a password?
Section 2-How not to store a password?
Chapter 6-Recent successful attacks
Section 1-Social engineering attacks
Section 2-Phishing attack
Section 3-You can avoid it
Chapter 7-How to authenticate Human?
Chapter 8-How do I know my computer has been hacked?
Section 1-New programs installed
Section 2-Signs of a hacker attendance
Section 3-Password has been modified unexpected
Section 4-Network bandwidth has changed
Section 5-Have I been hacked?
Chapter 9-If you are a victim
Chapter 10-References
Thank You Note
About Roger Fassinou
Connect with Me
Preface
Dear Reader,
What I am about to reveal may be out of scope, very essential tools and methods that would save you tons of hassle and save you time and money; The main goal of this book is to raise awareness that the rules of the Internet have changed.
In writing this book, I am making three assumptions: first, I am assuming that you are a simple user of Internet; in other words, no technical or experience is required to understand the book. The primary target of this book is the high school children mostly and the parents. Second, I am assuming that not everyone knows online security tips and best practices. My third assumption is that you speak English, even if I am planning to release a translation in other languages, I do apologize for the time it will take. However, if anyone would like to contribute, I would love to discuss that option to make this book available in many other languages. If you think you can, simply reach out me by using my contact information at the end of this book.
Besides, by writing this book, I would like to be grateful to my Professor Dr. Matthew Butcher who