Surviving Modern Technology: Understanding Safety and Privacy
()
About this ebook
Computers are wonderful. The internet is fantastic. You are not safe online ... unless you work at it.
Every week there are several new revelations about security weaknesses in our hardware and software, theft of millions of pieces of personal information, and new software and techniques to combat cybercriminals.
The goals of this book are to help motivate you to take some action and to teach you how to think about the privacy and security of your information and devices. But tt's not so much a "how to" book (i.e., what buttons to press) as a "why to" book because "how to" is limited to the next hardware or software update or data breach that exposes yet another problem. "Why to" teaches how to think about this problem so you can better understand the changes coming and when to take action..
This book discusses five levels of security: Physical, Access, System, Application and Behavioral for the general user in easy to understand, practical terms.
The author has nearly 50 years experience with all types and aspects of computers, software, and policy from many different perspectives.
Stefan H Unger PhD
Stefan H Unger obtained his PhD (MIT) based on computerized research in chemistry. He has been involved in the computer aspects of the pharmaceutical business as a researcher, programmer, scientific conference organizer, computer policy committee chair, chemistry/biotechnology market researcher, chemistry/biotechnology business development expert and hardware and software vendor. He has also been a VP Marketing, CEO and an independent marketing/business consultant in the drug discovery and small business marketing fields.He co-founded RealPsychSolutions with his wife Arlene K Unger, PhD, a well-known Southern California Clinical Psychologist. He is currently Web Administrator/Editor for RealPsychSolutions.com and DrArleneUnger.com. He is also an editor/publisher of psychological materials for the RPS Store and a marketing/business consultant to other Psychologists. He was Web Administrator/architect for the Orange County Psychological Association, and produced the OCPA Newsletter for several years. He is also an avid photographer: http://stefan-unger.artistwebsites.com
Related to Surviving Modern Technology
Related ebooks
Digital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsPC Safety 101 Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsSeven Deadliest Wireless Technologies Attacks Rating: 0 out of 5 stars0 ratingsHack Attack Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsUltimate Hack Rating: 0 out of 5 stars0 ratingsMy Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy! Rating: 0 out of 5 stars0 ratingsCNET Do-It-Yourself Home Networking Projects Rating: 0 out of 5 stars0 ratingsWireless Reconnaissance in Penetration Testing: Using Scanners to Monitor Radios during Penetration Tests Rating: 0 out of 5 stars0 ratingsCybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratingsYou: For Sale: Protecting Your Personal Data and Privacy Online Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsDetained Rating: 0 out of 5 stars0 ratingsAsterisk Hacking Rating: 0 out of 5 stars0 ratingsUnified Communications Forensics: Anatomy of Common UC Attacks Rating: 4 out of 5 stars4/5Identity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Basic security settings for gadgets & digital platforms Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsSenior Online Safety: Useful Tips to Stay Safe and Secure for Seniors, Both Online and Off Rating: 0 out of 5 stars0 ratingsHow To Stay Private Online Protecting Your Online Privacy and Shielding Your Online Presence from Snoopers Rating: 0 out of 5 stars0 ratingsDeep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5
Reviews for Surviving Modern Technology
0 ratings0 reviews
Book preview
Surviving Modern Technology - Stefan H Unger PhD
SURVIVING
MODERN
TECHNOLOGY
Understanding Safety and Privacy
By Stefan H Unger, PhD
Smashwords Edition
Copyright ©2014 Stefan H Unger. All Rights Reserved.
Smashwords Edition, License Notes
This eBook is licensed for your personal enjoyment only. This eBook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to your favorite eBook retailer and purchase your own copy. Thank you for respecting the hard work put into this eBook. Redistribution or reproduction or use of the contents, text, artwork, graphics, or photographs, in whole or in part, without permission of the publisher and copyright holder is prohibited.
v- 2/10/2023 21:26 a2/p2
Table of Contents
About
Ch 1 - Introduction
Ch 2 - Physical Security
Ch 3 - Access Security
Ch 4 - System Security
Ch 5 - Application Security
Ch 6 - Behavioral Security
Ch 7 - Conclusion
Ch 1 - Introduction
Computers are wonderful. The internet is fantastic. You are not safe online … unless you work at it.
Every week there are several new revelations about security weaknesses in our hardware and software, theft of millions of pieces of personal information, and new software and techniques to combat cybercriminals.
The goals of this book are to help motivate you to take some action and teach you how to think about privacy and security of your information and devices. But tt's not so much a how to
book (i.e., what buttons to press) as a why to
book because how to
is limited to the next hardware or software update or data breach that exposes yet another problem. Why to
teaches how to think about this problem so you can better understand the changes coming.
Who Are The Baddies?
In order to defend yourself, one of the most important things to know is who the enemies
are, what they want, and what you can reasonably do to protect yourself from the most important threats.
There was over $110B in cybercrime last year (J. Klein, MicroStrategies). Nearly 18% of adult internet users have had financial information stolen in January 2014; also nearly 21% have had a social media or eMail account compromised (Pew Research 2014). 49% of public WiFi networks are unsecured and unencrypted. Over 350M eMail address have been stolen, often with passwords. The Heartbleed SSL security breach has caused tremendous disruption and uncertainty. Massive data breaches have been reported almost weekly.
So who are the baddies?
•Your infant can knock your device on the floor, trashing your hard drive. She’s just being an infant.
•The cute girl over in the corner of the coffee shop grabs your smartphone while you get a napkin to clean up the milk your infant just spilled on your phone. She sells it the next day for $75...that’s a lot of coffee.
•The cute guy in the other corner is quietly watching all the WiFi traffic in the coffee shop and intercepting keystrokes (i.e. passwords and more). He’s after your identity.
•Your teenager’s friend thinks it’s funny to use your computer and mess with a few files