Advertisement

Where to Go for Assistance

Chapter
  • 1.1k Downloads

Abstract

It may seem that a “digital defense” is really difficult to set up in a world that seems almost overrun by “black hat hackers,” but there are a lot of very simple steps that can be taken to put reasonable levels of protection into place. This chapter is a “how to” guide to undertaking some basic cyber-protection strategies and outlines various strategies to protect yourself and your family against various types of malware, identity theft, and even steps to take with regard to cyber-bullying. These steps can be taken at reasonable cost—indeed, for less than the cost of subscribing to a newspaper. In the digital age we seem to be moving toward a world where we pay less to get information and pay more to screen out information that you do not want.

Keywords

Smart Phone Hate Crime Identity Theft Antivirus Software Backup Protection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Norton Internet Security www.Symantec-Norton.com/Security.
  2. 2.
  3. 3.
    2012 Identity Fraud Survey Report. Javelin Strategy & Research. February 2012.Google Scholar
  4. 4.
    “Top Ten Identity Theft Protection Sites.” www.top10identitytheftprotection.com.
  5. 5.
    Life Lock Individual Plans: Identity Theft Protection, http://www.lifelock.com/services/.
  6. 6.
    Daniel Brecht and edited by: Bill Bunter, “Pros and Cons of Computer Security Systems” http://www.brighthub.com/computing/smb-security/articles/32411.aspx also see. Finn Orfano and edited by Bill Bunte, “Firewall Basics Part III: The Pros and Cons of Firewall Methods.” http://www.brighthub.com/computing/smb-security/articles/8293.aspx.
  7. 7.
  8. 8.
    “She Stole My Life,” AARP Magazine, Nov. 2014.Google Scholar
  9. 9.
    “2013 Youth Risk Behavior Surveillance Survey, Centers for Disease Control and Prevention,” June 13, 2014.Google Scholar
  10. 10.
    Jeff R. Temple, Ph.D., Jonathan A. Paul, Ph.D., Patricia van den Berg, P.hD., Vi Donna Le, B.S.; Amy McElhany, B.A.; Brian W. Temple, M.D. “Teen Sexting and Its Association With Sexual Behaviors,” Journal of the American Medical Association, September 2012, Vol. 166, No. 9 http://archpedi.jamanetwork.com/article.aspx?articleid=1212181.
  11. 11.
    Gary M. Kaye, “Sooner or Later Your Hard Drive Will Fail: Computer backup is like digital fire insurance” AARP, June 23, 2011. http://www.aarp.org/technology/privacy-security/info-06-2011/back-up-computer-files.2.html.
  12. 12.
    Gretchen Anderson “Identity Theft: Who’s At Risk?” AARP Research, September 2014. http://www.aarp.org/money/scams-fraud/info-2014/identity-theft-incidence-risk-behaviors.html.
  13. 13.
    Kim Loop, “Prevention, Not Just Awareness, Key to Cyber Security.” AARP Texas October 11, 2012. http://states.aarp.org/prevention-awareness-cyber-security/.
  14. 14.
    Sid Kirchheimer, “Scam Alert: How to Cyberproof Your Phone – 12 ways to protect yourself and your device,” AARP Bulletin, May 2014 http://www.aarp.org/home-family/personal-technology/info-2014/cyberproof-stolen-phone-kirchheimer.html.
  15. 15.
    Technology, Tablets, and Social Media. http://states.aarp.org/prevention-awareness-cyber-security/.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Executive Board International Association for the Advancement of Space SafetySpace and Advanced Communications Research InstituteArlingtonUSA
  2. 2.LATA’s Global Institute for Security TrainingLos Alamos Technical AssociatesMcLeanUSA

Personalised recommendations