My data my privacy my choice : a step by step guide to secure your personal data and reclaim your online privacy / Rohit Srivastawa
Material type: TextSeries: ITpro collectionPublication details: India BPB Publications 2020Description: 254pISBN:- 9789389845181
- 005.8 SRI-R
Item type | Current library | Collection | Shelving location | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
Books | BITS Pilani Hyderabad | 003-007 | General Stack (For lending) | 005.8 SRI-R (Browse shelf(Opens below)) | Available | 45473 |
Key Features
● Understand your cyber risk exposure by calculating your Privacy Score™
● Improve your Privacy Score with easy-to-follow recommendations
● Different recommendations for different levels of expertise – YOUR choice!
● An ‘interactive’ book with inline QR code references for further learning!
● Instantly applicable recommendations that show immediate results!
● Gamification of recommended actions to incentivize best practice behaviours.
● Quantifiable* improvement by the end of the book!
Description
This book intends to be a comprehensive step-by-step guide on how to take control of all your digital footprints on the internet. You will begin with a quick analysis that will calculate your current Privacy Score. This book aims to improve this Privacy Score by the end of the book.
By the end of this book, you will have ensured that the information being leaked by your phone, desktop, browser, and internet connection is minimal-to-none. All your online accounts for email, social networks, banking, shopping, etc., will be made secure and (almost) impervious to attackers. You will have complete control over all your personal information available in public view.
Your personal information belongs to you and you alone. It should never be available for anyone else to see without your knowledge and your explicit permission.
What will you learn
● How to safeguard your privacy online
● How to secure your data & keep it private
● How to prevent your devices from leaking your private info
● How to prevent various websites & services from ‘spying’ on you
● How to ‘lock down’ your social media profiles
● How to identify threats to your privacy and what counter-measures to take
Who this book is for
Anyone who values digital security and privacy and wishes to ‘lock down’ their data will find this book helpful. Corporate IT departments can use this as a reference book to design employee data security practices and training modules.
Table of Contents
1. Prologue
2. Internet and Privacy
3. Android Devices
4. Apple iPhones
5. Smartphone Apps
6. Smart Devices & IoT
7. Desktops – Operating Systems
8. Desktops – Software Applications
9. Desktops – Browsers
10. Services - Email
11. Software-as-a-Service (SaaS)
12. Networks: Connectivity & Internet
13. Operational Security (OPSEC)
14. Epilogue
15. Bonus Chapter: Useful Tips and Tricks
There are no comments on this title.