Your Personal Information Is At Risk: A Guide For Protecting Yourself

Your Personal Information Is At Risk: A Guide For Protecting Yourself

by Rich Owen
Your Personal Information Is At Risk: A Guide For Protecting Yourself

Your Personal Information Is At Risk: A Guide For Protecting Yourself

by Rich Owen

eBook

$8.99  $9.99 Save 10% Current price is $8.99, Original price is $9.99. You Save 10%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

Your Personal Information is at Risk is a detailed, informative, and comprehensive book that explores the current various threats to the security of personal information. This information can be stored on phones or computers, and can also be accessed by scam artists calling a home and tricking people into sharing personal information. The author uses personal experience, as well as research, to describe current threats, and solutions to mitigate the risks of security breaches. This book is very well-written, organized, and clearly presented. This is a very complex topic, and there is quite a bit of information to learn. The author has done an excellent job of presenting the information in an easy-to-read platform that conveys all of the information in an appropriately serious tone, so that the reader fully understands both the information, and the need to be fully aware of the threats. The author also provides solutions to confront the risk and ensure that there is no breach of personal information.

Product Details

ISBN-13: 9781098338596
Publisher: BookBaby
Publication date: 11/11/2020
Sold by: Barnes & Noble
Format: eBook
Pages: 90
File size: 2 MB

About the Author

Rich Owen began his cyber security adventure in the in the Army Security Agency (ASA) in 1970. The primary customer of the ASA was the National Security Agency (NSA). In the ASA he performed the duties as an Electronic Warfare (EW)/Electronic Counter Measures (ECM) systems repair supervisor.

With B.S. degrees in Management and Computer Science from the University of Maryland he developed several information security programs to include:
• Mission Operations, Johnson Space Center, NASA
• Texas, Office of the Attorney General
• Early Warning Services
• American Traffic Solutions
• Cable One

Along the way, Rich was awarded the "Silver Snoopy" for the program that he created to protect the information and computer systems upon which the astronauts' lives depended. He and his team were given a Continuous Improvement Award by the NASA, for doing so and avoiding over $25M in cost.

Rich has also contributed to the profession and information protection industry. He contributed to the creation of many standards and solutions that we use today. He is a past international president of the Information Systems Security Association and is a member of the Information Security Hall of Fame.

Table of Contents

Dedication 1

Preface 3

Introduction 5

Documents 7

Life 7

Education & Career 8

Possessions 8

Finances 9

Family 9

Protection of your documents 9

Devices 11

Your Virtual Self 11

Privacy Points 12

Common risks with our Digital Devices 13

Hackers, Viruses, and Worms, Oh My! 13

Vulnerabilities 15

Backups 16

Phones 16

How does my phone know that it is me? 18

It's a Smartphone. 19

Personal Computers 20

How does the computer know that it is me? 21

Using a computer away from home. 23

Communication 25

Phone 25

Phone Scams 27

You've Got Mail! (Email) 31

The Basic Email 31

Evil Email 37

Evil Email Examples: 39

Final Thoughts on email 59

Messages 60

Message SCAMS: 61

Blended threats 62

Cloud 64

Internet (World Wide Web) 65

Firewalls 68

Wi-Fi 68

VPN (Virtual Private Network) 69

Applications (Apps) 69

Social Media 71

Likes & Comments 73

Smile 73

Financial, Medical and other Sensitive Applications 74

Credit Monitoring 74

"Do you want to play a game?" 74

Data Storage 75

Summary 77

Lies 77

Misuse Si Fraud 77

Risk and Risk Reduction 78

Bullies 79

Checklists & Reminders of what to do. 79

Phone calls: 79

Messages: 80

Application/Game: 80

Acknowledgements 82

Other Books by this Author 83

From the B&N Reads Blog

Customer Reviews