Security in the Digital World
eBook - ePub

Security in the Digital World

  1. 213 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Security in the Digital World

About this book

"Love the fact that it jumped in with 10 top tips for security, a great opening to the book… Excellent section on phishing emails/vishing/smishing, with great practical examples …"
Christopher Wright, Wright-CandA Consulting Ltd

Protect yourself from cyber threats and risks

Cyberspace, the Internet, computer networks, the digital world – call it what you will – is always developing. And so are the threats and risks of being online.

Security in the Digital World explains the common digital threats to home users, home offices, mobile users, consumers and parents alike, as well as providing tips, advice and guidance. It doesn't matter if you are working in the most mature enterprise environment, unemployed, retired or still at school, whether you often have a smartphone in your hand or only use an e-reader, you are at risk.

Security in the Digital World is a straightforward guide for the home user, parent, consumer and home office, providing a fountain of knowledge for modern security needs. It gives an overview of who conducts cyber attacks any why, and where cyber threats come from. It also explains what you can do to protect yourself and others, and provides a personal cyber security risk assessment.

Deeper insight into threats in the digital world

This must-have guide gives up-to-date information on consumer risks and provides:

  • Ten tips to keep your digital information secure;
  • Understanding and awareness of information security and cyber threats;
  • Explanations of what social engineering is and techniques used by cyber criminals;
  • Advice on what to look out for online and your rights as a consumer; and
  • Guidance on common threats in the digital age, including malware, social engineering and ransomware.

There is little technical knowledge or skill needed to understand and apply the book's tips and advice, and there are lots of images to help guide you.

From the top ten tips and the breakdown of consumer risks, to social networking and parental security, this book is an essential guide for anyone and everyone trying to stay safe and secure in the evolving digital world.

About the author

Graham Day spent 24 years in the military, including more than a decade as a counter-intelligence and security specialist on operational deployments around the world.

Since retiring from the military, Graham has provided a range of services as a consultant, including, but not limited to, information security, cyber security, business continuity, cyber risk and cyber resilience.

He is a CESG Certified Professional Security Information Risk Advisor, a Certified Information Systems Security Professional, and a member of the Author Group for British Standard 31111 Cyber Risk & Resilience.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Security in the Digital World by Graham Day in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

CHAPTER 1: THE INTERNET
When you use the Internet you are potentially creating a path for an attacker to get into your personal space, or to get your information. There are security controls you can put in place and also a few key behaviours for using the Internet that will better protect your information.
1.1 Connecting
The first thing to do for the internet is secure the connection. The ways to connect to the internet are introduced here as it is logical to understand this before you connect, but they are explained in greater detail in later sections.
Home networks (section 5.1) – this connection is secured by the home network encryption (section 5.1) and secured by password or passphrase (section 5.1).
Mobile network (section 6.3) – this connection is generally used when you are mobile. This connection should be secured with a VPN (section 6.3) if you are accessing important information or using your payment card.
Public wi-fi (section 6.2) – this connection should be used whenever you are in a public place and using provided wi-fi. For example, airports, trains, buses, coffee shops, restaurants, etc. This connection is secured through a VPN.
Note. A VPN is a Virtual Private Network, it is a secure channel created between you and the target website.
1.2 Browsers
There are a number of browsers available that you can use to search the Internet. Each browser has a different profile, how well it integrates with search engines, how fast it responds to requests, what features are built in, how fast it takes to reload, how quickly it downloads, etc. Below are some of the more popular free browsers.
Mozilla Firefox
Mozilla Firefox has been around for a number of years but has never been a front-runner. The issues with Microsoft Internet Explorer have, however, led to an increase in the use of Firefox as a default browser.
Mozilla Firefox can be customised to your requirements, is fast and secure, and protects your privacy.
Google Chrome
Google Chrome is inarguably the most widely used browser, with a 60% share of the market. It is unique in that it applies a single sign-on managing a number of Cloud-based personal applications, including Gmail (email), a calendar and personal notes. Google Chrome is also an advanced browser in the way security is applied, using two-factor authentication through a person’s smartphone. Google Chrome is regularly updated.
Google Chrome is a fast browser but is not the quickest. It has strong security features and a very simple interface, and other features are available and easily installed.
Opera
This browser has a built-in VPN (see section 6.3 to understand the advantages of this), an ad blocker and a battery saver mode.
Microsoft Edge
This is the new browser from Microsoft that has been issued from Windows 10 onwards. It has a good interface, offers good security and supports extensions that can increase the number of functions.
Vivaldi
This browser is fully customisable, fast and ‘fun’ to use, although it lacks the features of other browsers.
Internet Explorer
This is probably the most widely known Internet browser, but some versions may cause unnecessary risk to home users. The latest versions of Internet Explorer – IE10 and IE11 – remain supported, but any new Windows operating systems will be released with Microsoft Edge, or any later browser Microsoft creates.
Supported or not supported – what does it mean?
If a browser is supported it means the developer will issue updates to fix vulnerabilities. If a browser is not supported, no updates will be issued. Whether a browser is supported is very important to the user’s security.
  • Image
    Regularly check the security of your browser. Make sure updates are applied.
  • Image
    Look at the settings in your browser. If necessary, research the settings and apply them to make your browser as secure as possible.
1.3 Browser history
One thing you can do to protect yourself online, especially when you are using a public or shared computer, is to delete your browser history. There are two ways to do this:
Permanently – this is done in the ‘Settings’ or ‘Options’. Within this menu there will be an option to ‘Clear browsing data’ when you close the browser. Within the ‘Clear browsing data’ menu there will also be options to clear cookies, cache and other groups such as download history and even stored passwords. All of these things should be selected for as far back as possible; some browsers may offer to do this for a certain period of time, be it hours, days or weeks, or ‘from the beginning of time’.
Session, when closing the browser – as well as the permanent option in the browser ‘Settings’ or ‘Option’s menu, there will be a ‘History’ tab that will allow you to clear the session browsing history. This will only clear the browsing history and is not nearly as effective as the permanent option.
1. To clear your browsing history in Google Chrome go to the browser menu and select ‘Settings’ (3 vertical dots)
Image
2. To clear history, go to ‘Clear browsing data’
Image
3. Make sure you select ‘the beginning of time’ for all options and click ‘CLEAR BROWSING DATA’ as shown above.
Image
1.4 Tabs
Many browsers allow you to open multiple tabs in a session, but this can create a chance for an attacker to get sensitive information. If an attacker has got access to your internet session, then they could potentially access all tabs you have open (a session is from when you open the internet browser until you close it).
Social networking sites are a preferred way for attackers to get access to your online session. By not doing your online banking in the same session as having a social networking site open there is less possibility the online banking session will be compromised or breached.
There are a few things you can do to prevent this.
  • Image
    Have a browser that you only use to access sites where sensitive information will be used.
  • Image
    Have a different browser for searches and other general web access, such as Facebook.
  • Image
    If you find an item to buy during a search, open the link to the chosen item in a new window to buy it, closing the first window before buying.
  • Image
    Do not open sensitive sites in the same session as general access, such as searches or Facebook.
One thing you could do is have multiple browsers. For example, you could have three browsers available on your system:
  1. 1. One to access sensitive information, such as banks, medical, social, shopping, etc.
  2. 2. One to manage your professional profile, email, LinkedIn, etc.
  3. 3. One for general things such as searches and to access your social network, Facebook, etc.
1.5 Search engine
There are a number of search engines available, with five introduced below. These five are considered the primary search engines. Each of these search engines are free to use.
As a rule, search engines are financed by advertising. Search engines will return sponsored pages as the initial results of your search, then return the results that appear to be most closely associated with your search topic or feature keywords from your search. There are a number of risks with search engines, with the main one being that you trust the search engine to return genuine and safe results. The search engine’s results are based on topic and/or keywords, so it is possible that the primary results are laden with malware or misinformation but have been built with keywords featured in ...

Table of contents

  1. Cover
  2. Title
  3. Copyright
  4. Dedication
  5. Preface
  6. Acknowledgements
  7. About the Author
  8. Contents
  9. Introduction
  10. Personal digital security top ten
  11. Chapter 1: The Internet
  12. Chapter 2: The threats
  13. Chapter 3: The how
  14. Chapter 4: Operating system – computers and laptops
  15. Chapter 5: Home office
  16. Chapter 6: Mobile security
  17. Chapter 7: Smartphones and tablets
  18. Chapter 8: Consumers
  19. Chapter 9: Personal and consumer rights
  20. Chapter 10: Internet of Things (IoT)
  21. Chapter 11: Social networking security
  22. Chapter 12: Parental security
  23. Chapter 13: Resilience
  24. Chapter 14: Personal cyber security risk assessment
  25. ITG Resources