13 Index
List of Tables
1 Chapter 14TABLE 14-1 A Comparison of Full, Incremental, and Differential Backups
2 Chapter 16TABLE 16-1 Restoration Processes
List of Illustrations
1 Chapter 2FIGURE 2-1: A DDoS attack.FIGURE 2-2: A man-in-the-middle interception.FIGURE 2-3: Ransomware demanding ransom.
2 Chapter 6FIGURE 6-1: Network setup in which the work router communicates through the hom...FIGURE 6-2: Network setup using separate routers for work and home.
3 Chapter 7FIGURE 7-1: A (slightly edited image of) a one-time credit card number generato...FIGURE 7-2: One-time password for Snapchat generated by the app Authy — an exam...FIGURE 7-3: A secure website.FIGURE 7-4: Email with a link to a phony page.FIGURE 7-5: My website as seen in a Tor browser, with the Tor circuit informati...
4 Chapter 8FIGURE 8-1: A password manager.FIGURE 8-2: Secure Folder, the secure area app provided by Samsung for its Andr...FIGURE 8-3: A phone fingerprint sensor on a Samsung Galaxy S9 in an Otterbox ca...FIGURE 8-4: An RSA SecureID brand one-time password generator hardware token.
5 Chapter 9FIGURE 9-1: A phishing email.FIGURE 9-2: Example of a baiting message.FIGURE 9-3: An example of an Instagram account impersonating me, using my name,...
6 Chapter 10FIGURE 10-1: Inbound access is one major difference between businesses and indi...
7 Chapter 12FIGURE 12-1: A ransomware screen from an overt infection.FIGURE 12-2: A defaced website (ostensibly by the hacker group known as the Syr...FIGURE 12-3: The Microsoft Windows Task Manager.FIGURE 12-4: An example of communication problems while streaming video. Note t...FIGURE 12-5: Internet connections configured to use a proxy. If you do not use ...FIGURE 12-6: The modern version of the notorious Blue Screen of Death that appe...FIGURE 12-7: This pop-up window from adware malware attempts to scare people in...
Guide
1 Cover
4 Table of Contents
6 Index
7 About the Author
Pages
1 i
2 ii
3 1
4 2
5 3
6 4
7 5
8 6
9 7
10 8
11 9
12 10
13 11
14 12
15 13
16 14
17 15
18 16
19