My Data My Privacy My Choice
A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy
About the Book
Learn to secure your personal data & reclaim your online privacy!
â— Understand your cyber risk exposure by calculating your Privacy Score™
â— Improve your Privacy Score with easy-to-follow recommendations
â— Different recommendations for different levels of expertise – YOUR choice!
â— An ‘interactive’ book with inline QR code references for further learning!
â— Instantly applicable recommendations that show immediate results!
â— Gamification of recommended actions to incentivize best practice behaviors.
â— Quantifiable* improvement by the end of the book!
This book intends to be a comprehensive step-by-step guide on how to take control of all your digital footprints on the internet. You will begin with a quick analysis that will calculate your current Privacy Score. The aim of this book is to improve this Privacy Score by the end of the book.
By the end of this book, you will have ensured that the information being leaked by your phone, your desktop, your browser, and your internet connection is minimal-to-none. All your online accounts for email, social networks, banking, shopping, etc. will be made secure and (almost) impervious to attackers. You will have complete control over all of your personal information that is available in public view.
Your personal information belongs to you and you alone. It should never ever be available for anyone else to see without your knowledge and without your explicit permission.
What will you learn
â— How to safeguard your privacy online
â— How to secure your personal data & keep it private
â— How to prevent your devices from leaking your private info
â— How to prevent various websites & services from ‘spying’ on you
â— How to ‘lock down’ your social media profiles
â— How to identify threats to your privacy and what counter-measures to take
Who this book is for
Anyone who values their digital security and privacy and wishes to ‘lock down’ their personal data will find this book useful. Corporate IT departments can use this as a reference book to design data security practices and training modules for employees.
Table of Contents
2. Internet and Privacy
3. Android Devices
4. Apple iPhones
5. Smartphone Apps
6. Smart Devices & IoT
7. Desktops – Operating Systems
8. Desktops – Software Applications
9. Desktops – Browsers
10. Services - Email
11. Software-as-a-Service (SaaS)
12. Networks: Connectivity, & Internet
13. Operational Security (OPSEC)
15. Bonus Chapter: Useful Tips and Tricks
BPB is Asia's largest publishers of Computer & IT books. For the last 63 years BPB has been a friend, philosopher and guide for programmers, developers, hardware technicians, IT Professionals who have made things happen in the IT World.
Our students work
with the Best
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video CoursesSubscribe now
Master prominent technologies at full length and become a valued certified professional.Explore Now