Table of Contents
List of illustrations
- Figures in Chapter 1
- Figures in Chapter 2
- Figures in Chapter 3
- Figures in Chapter 4
- Figures in Chapter 5
- Figures in Chapter 6
- Figures in Chapter 7
- Figures in Chapter 8
- Figures in Chapter 9
- Figures in Chapter 10
Landmarks
Table of Contents
The Basics of Cyber Safety
Computer and Mobile Device Safety Made Easy
John Sammons
Michael Cross
Copyright
Syngress is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright 2017 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress.
ISBN: 978-0-12-416650-9
For Information on all Syngress publications visit our website at https://www.elsevier.com
Publisher: Joe Hayton
Acquisition Editor: Chris Katsaropoulos
Editorial Project Manager: Anna Valutkevich
Production Project Manager: Mohana Natarajan
Designer: Matthew Limbert
Typeset by MPS Limited, Chennai, India
Dedication
This book is dedicated gratefully to my wife and children, who were unbelievably supportive and helpful in making this possible. At the time this book comes out, my wife Jennifer and I will have been married 15 years. I love her as much today as when we first got together, and anyone who knows her can understand why.
We have three children who are full of ideas and dreams, and have no reservations in sharing them. Throughout this book, Sara, Jason, and Emily each provided a unique insight about their concerns of cyber safety, showed their interests and individuality, and contributed their own suggestions. Rather than being upset about how little they saw me as I worked on the book, they found their own ways to become a part of it.
Michael Cross
For Lora, Abby, and Rae for making me a truly blessed and lucky man. To my aunt Ruth whose love, support, and encouragement means so much. To my mother Juanita, and my grandmother Grace. For the many sacrifices you made and the example you set I miss you.
John Sammons
About the Authors
Michael Cross is a SharePoint Administrator and Developer, and has worked in the areas of software development, Web design, hardware installation/repairs, database administration, graphic design, and network administration. Working for law enforcement, he is part of an Information Technology team that provides support to over 1000 civilian and uniformed users. His theory is that when the users carry guns, you tend to be more motivated in solving their problems.
Michael has a diverse background in technology. He was the first computer forensic analyst for a local police service, and performed digital forensic examinations on computers involved in criminal investigations. Over 5 years, he recovered and examined evidence involved in a wide range of crimes, inclusive to homicides, fraud, and possession of child pornography. In addition, he successfully tracked numerous individuals electronically, as in cases involving threatening email. He has consulted and assisted in numerous cases dealing with computer-related/Internet crimes and served as an expert witness on computers for criminal trials. In 2007, he was awarded a Police Commendation for work he did in developing a system to track local high-risk offenders and sexual offenders.
With extensive experience in Web design and Internet-related technologies, Michael has created and maintained numerous websites and implementations of Microsoft SharePoint. This has included public websites, private ones on corporate intranets, and solutions that integrate them. In doing so, he has incorporated and promoted social networking features, created software to publish press releases online, and developed a wide variety of solutions that make it easier to get work done.
Michael has been a freelance writer and technical editor on over four dozen IT-related books, as well as writing material for other genres. He previously taught as an instructor and has written courseware for IT training courses. He has also made presentations on Internet safety, SharePoint, and other topics related to computers and the Internet. Despite his experience as a speaker, he still finds his wife won't listen to him.
Over the years, Michael has acquired a number of certifications from Microsoft, Novell, and Comptia, including MCSE, MCP+I, CNA, and Network+. When he isnt writing or otherwise attached to a computer, he spends as much time as possible with the joys of his life: his lovely wife Jennifer; darling daughter Sara; adorable daughter Emily; and charming son Jason.
For the latest information on him, his projects, and a variety of other topics, you can follow him on Twitter @mybinarydreams, visit his Facebook page at www.facebook.com/mybinarydreams, follow him on LinkedIn at www.linkedin.com/in/mcross1, or read his blog at http://mybinarydreams.wordpress.com.
John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in Huntington, West Virginia. He teaches digital forensics, electronic discovery, information security, and technology in the School of Forensic and Criminal Justices Sciences. Hes also adjunct faculty with the Marshall University graduate forensic science program where he teaches the advanced digital forensics course. John, a former police officer, is also an Investigator with the Cabell County Prosecuting Attorneys Office and a member of the West Virginia Internet Crimes Against Children Task Force. He is a Member of the American Academy of Forensic Sciences, the High Technology Crime Investigation Association, and Infragard.