security measures

Type: 
Topical Term
Subfield: 
x
Alias: 
security measures

Are smartphones a threat to privacy?

"Describes the rise of cell phone privacy concerns, how these issues affect individuals and society, and how these issues are being addressed"--Provided by publisher.

Personal data collection

Presents the history of data collection and examines how data is used for research, sales, and surveillance. Explores concerns surrounding personal data collection, and discusses its future. Includes sidebars, graphs, facts, primary sources, critical thinking questions, color photographs, a glossary, and further resources.

Cell phone privacy

Explores the topic of cell phone privacy, discussing various scams, identity theft, concerns surrounding cell phone privacy, and helpful security measures. Includes sidebars, graphs, facts, primary sources, critical thinking questions, color photographs, a glossary, and further resources.

Manipulated

inside the global war to hijack elections and distort the truth
2020
Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow's attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake" videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late.

Cybercrime

Traces the history of hacking and explores the topic of cybercrime, discussing various scams, types of malware, identity theft, cyberbullying, and possible security solutions. Includes sidebars, graphs, facts, primary sources, critical thinking questions, color photographs, a glossary, and further resources.

Cyber smart

five habits to protect your family, money, and identity from cyber criminals
2019

Personal data management

2018
Discusses personal data management, covering how to protect personal data, what data is at risk, how to create a strong password, and more.

Election manipulation

is America's voting system secure?
"Law enforcement and intelligence experts warn that Russia and other foreign countries are likely to try to interfere in America's presidential election in 2020. Federal and state officials must guard against computer hacks, disinformation and fake news on social media, and attempts to disrupt the voting system. This book examines how America's voting system can be made more secure"--Provided by publisher.

Staying safe online

Explores how children can use the internet safely, covering such topics as cyberbullying, viruses, and online gaming.
Cover image of Staying safe online

Internet security and you

"Learn about the importance of internet security, how to protect yourself, and what to do if you get hacked"--Provided by publisher.
Cover image of Internet security and you

Pages

Subscribe to RSS - security measures