Cyber smart : (Record no. 87295)

000 -LEADER
fixed length control field 08055cam a22004097a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240508104603.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field a||||fo||d| 00| 0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr aa aaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181031s2019 inu b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119559610
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781119559634
Qualifying information (ebk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781119559641
Qualifying information (ebk)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number M4285 2019
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person McDonough, Bart,
Relator term author.
245 10 - TITLE STATEMENT
Title Cyber smart :
Remainder of title five habits to protect your family, money, and identity from cyber criminals /
Statement of responsibility, etc Bart R. McDonough.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis, IN :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc [2019]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 ## - CONTENTS
Formatted contents note TABLE OF CONTENTS<br/>Foreword xxiii<br/><br/>Introduction xxv<br/><br/>I Setting the Stage 1<br/><br/>1 Overview of Cyber Risks 3<br/><br/>Real Estate Wire Transfer Fraud Prevention Steps 5<br/><br/>If You’re a Victim of Wire Transfer Fraud 6<br/><br/>Cyber-Risk Statistics 6<br/><br/>Breaches, Cyberattacks, and Hacks—Oh My! 8<br/><br/>Notes 9<br/><br/>2 Attackers 11<br/><br/>The Adversary 13<br/><br/>Nation-State Attackers 14<br/><br/>Criminal Organizations 16<br/><br/>Terrorist Organizations 17<br/><br/>Bad Actors Who Got Caught 17<br/><br/>Notes 21<br/><br/>3 Attack Targets and Goals 23<br/><br/>How Attackers Get Your Money 24<br/><br/>What Attackers Do with Your Money 24<br/><br/>How Attackers Get Your Credentials 25<br/><br/>What Attackers Do with Your Credentials 25<br/><br/>How Attackers Get Your PII 26<br/><br/>What Attackers Do with Your PII 26<br/><br/>How Attackers Get Your Computing Resources 27<br/><br/>What Attackers Do with Your Computing Resources 27<br/><br/>Notes 29<br/><br/>4 Attack Methods 31<br/><br/>Social Engineering 32<br/><br/>Phishing 33<br/><br/>Phishing Attacks 33<br/><br/>Email Phishing 34<br/><br/>Spear Phishing 35<br/><br/>Whaling 37<br/><br/>Email Compromise 38<br/><br/>Clone Phishing 39<br/><br/>Voice Phishing 40<br/><br/>SMS Phishing 41<br/><br/>Pretexting 42<br/><br/>Malware 43<br/><br/>Cryptomining Malware and Cryptojacking 43<br/><br/>Cryptomining 43<br/><br/>Cryptojacking 44<br/><br/>Ransomware 45<br/><br/>Spyware 46<br/><br/>Scareware 47<br/><br/>Adware 47<br/><br/>Trojans 48<br/><br/>Wi-Fi Network Hacking 49<br/><br/>Scams 50<br/><br/>Fake Technical Support 51<br/><br/>Government Agency Impersonation 52<br/><br/>The Grandparent Scam 53<br/><br/>Virtual Kidnapping Extortion 53<br/><br/>Unpaid Utility Bill Scams 54<br/><br/>Online Dating Scams 54<br/><br/>Job Scams 56<br/><br/>Charity Scams 58<br/><br/>Robocalling Scams 58<br/><br/>Notes 61<br/><br/>5 Attack Chain 65<br/><br/>Attack Chain Phases 67<br/><br/>Links in the Attack Chain 68<br/><br/>Notes 70<br/><br/>6 Attack Vectors 71<br/><br/>Email 72<br/><br/>Texting 73<br/><br/>Phone Calls 75<br/><br/>Websites 76<br/><br/>Software 78<br/><br/>USB Key 78<br/><br/>Wi-Fi 79<br/><br/>Notes 81<br/><br/>7 Brilliance in the Basics 83<br/><br/>Brilliance 1: Update Your Devices 84<br/><br/>Brilliance 2: Enable Two-Factor Authentication 85<br/><br/>Brilliance 3: Use a Password Manager 86<br/><br/>Brilliance 4: Install and Update Antivirus Software 87<br/><br/>Brilliance 5: Back Up Your Data 89<br/><br/>Notes 90<br/><br/>8 Mistakes 91<br/><br/>Being the Source of a Data Breach 92<br/><br/>Mixing Work and Personal Information 93<br/><br/>Notes 94<br/><br/>9 Incident Response 95<br/><br/>Falling for a Phishing Attack 96<br/><br/>Getting Infected with Malware 98<br/><br/>Getting Infected with Ransomware 100<br/><br/>Email Compromise 102<br/><br/>II Specific Recommendations 105<br/><br/>10 Protecting Your Identity 107<br/><br/>Methods of Identity Theft 108<br/><br/>How to Check Whether Your PII is Exposed 110<br/><br/>Identity Monitoring Services 111<br/><br/>Recommendations: Protecting Your Credit Identity 112<br/><br/>Other Types of Identity Theft 114<br/><br/>Medical Identity Theft 114<br/><br/>Recommendations: Protecting Your Medical Identity 117<br/><br/>Military Personnel Identity Theft 118<br/><br/>Recommendations: Protecting Your Identity While in the Military 118<br/><br/>Senior Citizen Identity Theft 119<br/><br/>Recommendations: Protecting the Identities of Senior Citizens 120<br/><br/>Notes 122<br/><br/>11 Protecting Your Children 125<br/><br/>The Growing Problem of Child Identity Theft 127<br/><br/>Recommendations: Protecting Your Child’s Identity 128<br/><br/>Protecting Your Child on the Computer 129<br/><br/>Smart Toy Risks 131<br/><br/>Recommendations: Protecting Smart Toys 133<br/><br/>Recommendations: Protecting Your Children Online 135<br/><br/>Notes 136<br/><br/>12 Protecting Your Money 137<br/><br/>Home Buyer Wire Transfer Fraud 138<br/><br/>Home Equity Wire Transfer Fraud 139<br/><br/>IRS Impersonation Fraud 140<br/><br/>Credit Card Fraud 141<br/><br/>Gift Card Fraud 143<br/><br/>Card Skimmer Fraud 144<br/><br/>Scams Targeting the Unbanked and Underbanked 145<br/><br/>Recommendations: Protecting Your Money 146<br/><br/>Notes 149<br/><br/>13 Protecting Your Email 151<br/><br/>Yahoo Data Breach 152<br/><br/>The Value of a Hacked Email Account 153<br/><br/>The Challenge of Email Privacy 154<br/><br/>Recommendations: Protecting Your Email 155<br/><br/>Notes 158<br/><br/>14 Protecting Your Files 159<br/><br/>Threats to Your Files 160<br/><br/>Threats to Your Files Not Caused by Bad Actors 161<br/><br/>Threats to Your Files Caused by Bad Actors 161<br/><br/>Cloud Storage vs Local Storage 161<br/><br/>Your Cloud File Storage Responsibilities 162<br/><br/>Your Local File Storage Responsibilities 162<br/><br/>Finding the Right Cloud Provider 163<br/><br/>Cloud Storage Doesn’t Equal File Backups 163<br/><br/>Risks of Using Only an External Hard Drive 164<br/><br/>Effective File Management 164<br/><br/>Recommendations: Protecting Your Files 165<br/><br/>Notes 168<br/><br/>15 Protecting Your Social Media 169<br/><br/>Why Bad Actors Love Social Media 171<br/><br/>Twitter: A Bad Actor’s Paradise 172<br/><br/>How Third Parties Mine Your Social Media Data 173<br/><br/>Recommendations: Protecting Your Social Media 176<br/><br/>Notes 178<br/><br/>16 Protecting Your Website Access and Passwords 179<br/><br/>Password Hashing Slows Down Bad Actors 180<br/><br/>Password Reuse Fuels Credential Stuffing 181<br/><br/>The Great Password Problem 182<br/><br/>Effective Password Management 184<br/><br/>Password Creation Formula 185<br/><br/>Password Creation Mistakes 186<br/><br/>Recommendations: Protecting Your Website Access and Passwords 187<br/><br/>Notes 191<br/><br/>17 Protecting Your Computer 193<br/><br/>The Rising Threat of Cryptojacking: The Illegal Form of Cryptomining 195<br/><br/>Cryptomining Using Web Visitors’ CPU Resources 196<br/><br/>Donating CPU Resources for Good 198<br/><br/>Recommendations: Protecting Your Computer 198<br/><br/>Notes 201<br/><br/>18 Protecting Your Mobile Devices 203<br/><br/>Protect Against Mobile Port-Out Scams 206<br/><br/>Mobile Malware 208<br/><br/>iPhone vs Android Security 209<br/><br/>Device Loss and Theft 210<br/><br/>Recommendations: Protecting Your Mobile Devices 211<br/><br/>Notes 215<br/><br/>19 Protecting Your Home Wi-Fi 217<br/><br/>Threats Against Your Home Wi-Fi Network 219<br/><br/>Recommendations: Protecting Your Home Wi-Fi 221<br/><br/>Notes 224<br/><br/>20 Protecting Your IoT Devices 225<br/><br/>Threats Against IoT Devices 227<br/><br/>IoT Privacy Issues 229<br/><br/>Smart Homes 230<br/><br/>Recommendations: Protecting Your IoT Devices 234<br/><br/>Notes 236<br/><br/>21 Protecting Your Information When Traveling 237<br/><br/>Public Wi-Fi Dangers 239<br/><br/>General Travel Dangers 241<br/><br/>Recommendations: Protecting Your Information When Traveling (General) 243<br/><br/>Nation-State Travel Dangers 245<br/><br/>Recommendations: Protecting Your Information When Traveling Abroad 246<br/><br/>Notes 249<br/><br/>Index 251
520 ## - SUMMARY, ETC.
Summary, etc An easy-to-read guide to protecting your digital life and your family online<br/><br/>The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.--Provided by the Publisher
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658
Link text Full text is available at Wiley Online Library Click here to view
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2024-05-08 ALBASA Consortium 52168 005.8 M1471 2018 CL-52168 2024-05-08 2024-05-08 EBOOK