Cybersecurity for the Home and Office : : The Lawyer's Guide to Taking Charge of Your Own Information Security.
Saved in:
: | |
---|---|
Place / Publishing House: | La Vergne : : American Bar Association,, 2018. Ã2018. |
Year of Publication: | 2018 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (350 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Intro
- Title Page
- Copyright
- Dedication
- Contents
- About the Author
- Acknowledgments
- Foreword
- CHAPTER 1 The Need for Cybersecurity
- Why This Book?
- What You Should Do Right Now
- How This Book Is Organized
- You Can Improve Your Own Cybersecurity
- CHAPTER 2 The Black Market for Your Data: The Cybercrime Economy
- A. Introduction
- B. It Is a Big Business
- C. It Is International
- D. Digital Currency
- E. Payment Card Fraud: An Example of the Cybercrime Economy
- F. Other Cybercrime and Identity Theft Schemes
- 1. Financial Account Takeover
- 2. New Financial Account Opening
- 3. Infected Computers
- 4. Phishing, Spam, and Internet Account Takeover
- 5. Other Ways to Obtain Passwords
- 6. E-mail Account Compromise (Hack)
- 7. Ransomware
- 8. Scareware and Technical Support Scams
- G. Government and Law Enforcement Response
- CHAPTER 3 Advertising: Another Market for Your Data
- A. Introduction
- B. Corporate Collection and Use of Your Information and Data
- C. What (or Who) Is the Product?
- D. Privacy Policies and the Consumer
- E. Corporate Data Storage
- F. Conclusion
- CHAPTER 4 Basic Information Security Principles
- A. Introduction
- B. Physical Security
- 1. Theft and Damage
- 2. Controlling Access to Your Devices at Home
- C. Confidentiality
- 1. Authentication
- 2. Encryption
- D. Availability
- 1. "If It Ain't Broke, Don't Fix It." But Maybe It Is Broken After All?
- 2. Availability, Authentication, and Confidentiality
- 3. Availability and Ransomware and Other Malicious Destruction
- 4. Availability and Backup
- 5. Business Continuity and Disaster Recovery Planning
- E. Integrity
- F. The Principle of "Least Privilege" and "Need to Know"
- 1. Data Access
- 2. Administrator Rights and Accounts
- G. Information Classification
- H. Conclusion.
- CHAPTER 5 Basic Computer Principles
- A. Introduction
- B. The Evolution of Computing
- 1. Storing Information
- 2. Processing Information
- C. Computer Hardware
- 1. Case
- 2. Power Supply
- 3. Display
- 4. Ports: USB, Parallel, Serial, VGA, DVI, HDMI, DP
- 5. Input Devices (Keyboard, Mouse, Microphone, Camera, and More)
- 6. Network Interface Controller
- 7. Processor (Central Processing Unit, Microprocessor)
- 8. Random Access Memory
- 9. Motherboard (System Board)
- 10. Internal Data Storage
- 11. External Data Storage
- 12. External Devices Such as Scanners and Printers
- D. Programs That Run on Your Computer: BIOS, Operating System, Applications
- 1. BIOS
- 2. Operating System
- 3. File System
- 4. Applications (Software)
- 5. Virtual Ports
- E. From Desktop to Miniature: Laptop, Notebook, Tablet, Smartphone, Smartwatch, IoT
- F. Computers on Steroids: The Cloud and Data Centers
- G. Encryption of Data at Rest
- H. Conclusion
- CHAPTER 6 Basic Networking and the Internet
- A. Introduction
- B. Network Interface Controller
- C. Internet
- 1. Dial-up
- 2. Cable Internet (Broadband)
- 3. Phone Company Internet (DSL, FiOS)
- 4. Cellular Company Internet
- 5. Satellite Internet
- D. Modem
- E. Router
- F. Internet Communication 101
- 1. IP Addresses on the Internet
- 2. IP Addresses on Your Local Network: Network Address Translation
- 3. Ports: Virtual Router Ports and Computer Ports
- 4. TCP/UDP Internet Protocols (Language)
- 5. Network Layers
- G. Wired Networking
- H. Wireless Networking
- I. Encryption in Transit
- J. Conclusion
- CHAPTER 7 Start Securing Yourself
- A. Introduction
- B. Set Your Cybersecurity Dial
- C. Turning Up Your Security Dial Is an Investment
- D. There Is No Perfect Product or Solution
- E. Let's Get Started (If You Haven't Already).
- 1. Put a Password on All of Your Computing Devices
- 2. Enable the "Auto Lock" Feature
- 3. Run an Anti-Malware Scan on Your Laptop and Desktop
- 4. Disconnect from the Internet When You Don't Need It
- 5. Use Complex and Unique Passwords
- 6. Enable "Two-Step" Login
- 7. Ensure That Your Home Wi-Fi Network Is Password Protected
- F. Conclusion
- CHAPTER 8 Secure Your Devices
- A. Introduction
- B. Mentally Assess Your Devices
- C. Getting Started
- D. Device Inventory (Scavenger Hunt)
- 1. Device Description
- 2. Ownership and Expectation of Privacy
- E. Access: Physical Control
- F. Access: Electronic (Technical)
- 1. Device Password Complexity
- 2. Auto Lock Feature and Affirmatively Locking Your Device
- G. User Accounts: Usage by Whom and for What Purposes?
- 1. Administrator Accounts vs. User Accounts
- 2. Segregation of User Accounts
- H. Operating System
- I. Applications (Software)
- J. Data Stored on Device
- K. Data the Device Can Access (Cloud Data)
- L. Anti-Malware
- M. Internet Access
- N. Firewall
- O. Decommissioning Your Device
- 1. Basic Decommissioning Steps
- P. Conclusion
- CHAPTER 9 Secure Your Data
- A. Introduction
- B. Mentally Assess Your Data and What It Means to You
- 1. Assess Your Own Skills and Memory
- 2. Assess by Data Type
- 3. Assess by Data Importance and Risk
- 4. Assess by Data Storage Location and Provider
- 5. Assessment Wrap-Up
- C. Getting Started
- D. Secure Your Devices (Encore)
- E. Back Up Your Data
- 1. Manually Back Up Data to an External Hard Drive
- 2. Make Incremental Backups of Your Most Important Documents
- 3. Manually Back Up Data from Your Cloud Accounts to a Local Device or External Hard Drive
- 4. Backup Using Your Operating System's Native Backup Application
- 5. Automatic Backup vs. Manual Backup.
- F. Secure Your Cloud Data and Internet Accounts (and Back Them Up)
- 1. Secure Your Important Online Accounts
- 2. Secure Your "Unimportant Accounts" as Best You Can
- G. Consider Encryption to Secure Data on Your Local Device
- 1. To Encrypt or Not to Encrypt? That Is the Question
- 2. Encryption by the Application
- 3. File and Folder Encryption by the Operating System
- 4. Full Disk Encryption
- 5. Encryption Summary
- H. Organize Your Data-Your Files and Folders
- 1. Basic File Organization Concepts
- 2. Storage Location
- I. Conclusion
- CHAPTER 10 Secure Your Network and Internet Use
- A. Introduction
- B. Mentally Assess Your Home Network
- C. Identify Parts of Your Home Network
- D. Internet Connection
- E. Modem
- F. Router and Wi-Fi
- 1. Learn About Basic Wi-Fi Routing
- 2. Log In to Your Router Administration Portal
- 3. Secure Your Router Administration Username and Password
- 4. Update Router Firmware
- 5. Secure the Wi-Fi Network Password and Ensure the Network Is Encrypted
- 6. Evaluate Your Wi-Fi Network Name
- 7. Disable Wi-Fi Protected Setup
- 8. Disable Remote Access Features You Don't Need
- 9. Enable Your Router's Firewall (If Available)
- 10. Disable Universal Plug and Play If You Don't Need It
- 11. Run Your Router's Security Self-Assessment Function (If Available)
- 12. Enable a Guest Network on Your Router (If Available)
- 13. Check Your Router's Physical Security
- 14. Learn About Additional Router and Wi-Fi Security Features
- 15. Wi-Fi Router Conclusion
- G. Software Firewalls (Encore for Your Laptops and Desktops)
- H. Review Device Software That Accesses the Internet (Encore for What Is Phoning Home)
- I. How Your Data Is Transmitted
- J. Equipment on the Network
- 1. Printers, Scanners, Fax Machines, All-in-Ones, and More
- 2. Network Attached Storage.
- K. The "Internet of Things" and Smart Homes
- L. Reduce Your Attack Surface: Disconnect When Not Needed
- M. More About Networks for the Very Curious
- 1. Windows Task Manager
- 2. Windows Resource Monitor
- 3. Windows Firewall
- 4. Windows Firewall with Advanced Security
- 5. Windows Commands Regarding Network Activity
- 6. Mac Applications and Commands Regarding Network Activity
- 7. Install a Free Software Firewall
- N. Conclusion
- CHAPTER 11 Secure Your Family, Children, and Seniors
- A. Introduction
- B. Children
- 1. Assessment
- 2. Your Parental "Privacy Policy"
- 3. Educating Your Child to Make Good Decisions
- 4. Reviewing Your Child's Devices and Computer Usage
- 5. Sample Guidelines or Rules of Conduct
- 6. Reviewing the Data That Is Posted About Your Children
- C. Seniors
- D. Conclusion
- CHAPTER 12 Secure Yourself When You Travel
- A. Introduction
- B. Devices and Travel
- 1. Preventing Loss or Theft
- 2. Using Someone Elses Device
- C. Internet Access and Travel
- D. Data and Travel
- 1. Data You Bring (Data at Rest)
- 2. Data You Access (Data in Transit)
- E. Miscellaneous Anti-Fraud When You Travel
- F. Special Considerations When Traveling to Certain Countries
- G. Conclusion
- CHAPTER 13 Secure the Work Office
- A. Introduction
- B. The Workplace Mental Assessment
- C. Physically Secure Your Office
- 1. Visitor Entry
- 2. Locks and Doors
- 3. Alarm Systems and Video Surveillance
- 4. The "Plain View" Doctrine in Your Office
- D. Securing Your Employees and Coworkers
- 1. Screening and the Insider Threat
- 2. Training
- 3. Shadow IT in the Office
- 4. Acceptable Use of Workplace Computers
- E. Secure the Devices in Your Office
- F. Secure the Data in Your Office
- 1. Network Storage Devices in Your Office
- 2. Documents and Data in the Cloud
- 3. E-mail
- 4. Data at Rest.
- 5. Data in Transit.