Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Surviving Modern Technology: Understanding Safety and Privacy
Surviving Modern Technology: Understanding Safety and Privacy
Surviving Modern Technology: Understanding Safety and Privacy
Ebook64 pages1 hour

Surviving Modern Technology: Understanding Safety and Privacy

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Computers are wonderful. The internet is fantastic. You are not safe online ... unless you work at it.

Every week there are several new revelations about security weaknesses in our hardware and software, theft of millions of pieces of personal information, and new software and techniques to combat cybercriminals.

The goals of this book are to help motivate you to take some action and to teach you how to think about the privacy and security of your information and devices. But tt's not so much a "how to" book (i.e., what buttons to press) as a "why to" book because "how to" is limited to the next hardware or software update or data breach that exposes yet another problem. "Why to" teaches how to think about this problem so you can better understand the changes coming and when to take action..

This book discusses five levels of security: Physical, Access, System, Application and Behavioral for the general user in easy to understand, practical terms.

The author has nearly 50 years experience with all types and aspects of computers, software, and policy from many different perspectives.

LanguageEnglish
Release dateSep 12, 2014
ISBN9781310731433
Surviving Modern Technology: Understanding Safety and Privacy
Author

Stefan H Unger PhD

Stefan H Unger obtained his PhD (MIT) based on computerized research in chemistry. He has been involved in the computer aspects of the pharmaceutical business as a researcher, programmer, scientific conference organizer, computer policy committee chair, chemistry/biotechnology market researcher, chemistry/biotechnology business development expert and hardware and software vendor. He has also been a VP Marketing, CEO and an independent marketing/business consultant in the drug discovery and small business marketing fields.He co-founded RealPsychSolutions with his wife Arlene K Unger, PhD, a well-known Southern California Clinical Psychologist. He is currently Web Administrator/Editor for RealPsychSolutions.com and DrArleneUnger.com. He is also an editor/publisher of psychological materials for the RPS Store and a marketing/business consultant to other Psychologists. He was Web Administrator/architect for the Orange County Psychological Association, and produced the OCPA Newsletter for several years. He is also an avid photographer: http://stefan-unger.artistwebsites.com

Related to Surviving Modern Technology

Related ebooks

Security For You

View More

Related articles

Reviews for Surviving Modern Technology

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Surviving Modern Technology - Stefan H Unger PhD

    SURVIVING

    MODERN

    TECHNOLOGY

    Understanding Safety and Privacy

    By Stefan H Unger, PhD

    Smashwords Edition

    Copyright ©2014 Stefan H Unger. All Rights Reserved.

    Smashwords Edition, License Notes

    This eBook is licensed for your personal enjoyment only. This eBook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to your favorite eBook retailer and purchase your own copy. Thank you for respecting the hard work put into this eBook. Redistribution or reproduction or use of the contents, text, artwork, graphics, or photographs, in whole or in part, without permission of the publisher and copyright holder is prohibited.

    v- 2/10/2023 21:26 a2/p2

    Table of Contents

    About

    Ch 1 - Introduction

    Ch 2 - Physical Security

    Ch 3 - Access Security

    Ch 4 - System Security

    Ch 5 - Application Security

    Ch 6 - Behavioral Security

    Ch 7 - Conclusion

    Ch 1 - Introduction

    Computers are wonderful. The internet is fantastic. You are not safe online … unless you work at it.

    Every week there are several new revelations about security weaknesses in our hardware and software, theft of millions of pieces of personal information, and new software and techniques to combat cybercriminals.

    The goals of this book are to help motivate you to take some action and teach you how to think about privacy and security of your information and devices. But tt's not so much a how to book (i.e., what buttons to press) as a why to book because how to is limited to the next hardware or software update or data breach that exposes yet another problem. Why to teaches how to think about this problem so you can better understand the changes coming.

    Who Are The Baddies?

    In order to defend yourself, one of the most important things to know is who the enemies are, what they want, and what you can reasonably do to protect yourself from the most important threats.

    There was over $110B in cybercrime last year (J. Klein, MicroStrategies). Nearly 18% of adult internet users have had financial information stolen in January 2014; also nearly 21% have had a social media or eMail account compromised (Pew Research 2014). 49% of public WiFi networks are unsecured and unencrypted. Over 350M eMail address have been stolen, often with passwords. The Heartbleed SSL security breach has caused tremendous disruption and uncertainty. Massive data breaches have been reported almost weekly.

    So who are the baddies?

    •Your infant can knock your device on the floor, trashing your hard drive. She’s just being an infant.

    •The cute girl over in the corner of the coffee shop grabs your smartphone while you get a napkin to clean up the milk your infant just spilled on your phone. She sells it the next day for $75...that’s a lot of coffee.

    •The cute guy in the other corner is quietly watching all the WiFi traffic in the coffee shop and intercepting keystrokes (i.e. passwords and more). He’s after your identity.

    •Your teenager’s friend thinks it’s funny to use your computer and mess with a few files

    Enjoying the preview?
    Page 1 of 1