SlideShare a Scribd company logo
1 of 2
Download to read offline
Brief Overview - My Data My Privacy My Choice
This book will help you understand how much of your personal
information gets freely shared on the internet without your
explicit knowledge and authorization. This book will also give
specific and comprehensive instructions on how you can take
control of all that information.
By the end of this book, you will have ensured that the
information being leaked by your phone, your desktop, your
browser, and your internet connection is minimal-to-none. All
your online accounts for email, social networks, banking,
shopping, etc. will be secure and (significantly) impervious to attackers. You will have
complete control over all of your personal information that is available to public view. In fact,
if you so choose, you will even be able to create ‘purposeful misinformation’ to counter any
potential threats to your privacy and security, if and when necessary.
Over the 15 chapters in this book, you will learn the following:
Chapter 1 introduces a quick self-assessment and establishes some ‘ground-rules’ by
defining various terms and concepts such as #RohitRecommends and the scoring system
used throughout this book.
Chapter 2 explains how various devices, services, and adversaries of all kinds have the
potential to track and extract your private information by outlining basic and advanced
methods to proactively identify leakage of personal information.
Chapter 3 discusses the Android operating system, explores the privacy concerns
surrounding them, and provides recommendations on how to deal with such issues.
Chapter 4 looks at the various Apple devices available in the market, attempts to understand
the privacy concerns surrounding them and provides recommendations on how to deal with
such issues.
Chapter 5 highlights the various issues with the app-ecosystem present in both the mobile
platforms – Android and iOS – and provides recommendations on how to identify and deal
with such apps.
Chapter 6 explores various ‘smart’ devices available in the market and how they can impact
the privacy of your personal data and provides specific recommendations on how to ensure
the privacy of your personal data while using smart devices and/or IoT.
Chapter 7 evaluates how known vulnerabilities in popular desktop operating systems can be
exploited by malicious actors to prey on your personal data and provides recommendations
on how to deal with these vulnerabilities/exploits.
Chapter 8 evaluates how commonly exploited vulnerabilities in software applications can be
exploited by malicious actors to prey on your personal data and provides recommendations
on how to deal with these vulnerabilities/exploits.
Chapter 9 evaluates commonly used desktop browsers, discusses how they can be exploited
by malicious actors to prey on your personal data and provides recommendations on how to
deal with these vulnerabilities/exploits.
Chapter 10 explores the privacy issues and threats associated with accessing email, how it
can be compromised by malicious actors, and provides recommendations to secure your
email inbox.
Chapter 11 evaluates different categories of software provided as services (a.k.a. SaaS) over
the internet, i.e., Social Networks, Netbanking, Shopping websites, etc. and the privacy issues
and threats to consider while accessing these services over the internet.
Chapter 12 discusses the various methods of connecting to different networks (such as
Broadband, Wi-Fi, GSM/CDMA, Bluetooth, NFC, etc.) and evaluates each of them from a
privacy perspective.
Chapter 13 discusses Operational Security (OPSEC) and presents simple Dos and Don’ts
that you can follow to implement OPSEC-like behaviours in your daily routines.
Chapter 14 summarizes all the learning from the previous chapters and invites you to re-
assess yourself. If you did everything right up to this point, you should be able to see significant
improvement over the results you received in the first chapter!
Chapter 15 contains information that is important to know but a little too detailed for casual
reading. You can skip this chapter if you’d like, but I strongly recommend you read it anyway.
Available at
Book Website: https://privacy.clinic
Amazon.in (Kindle): https://amzn.to/3925Hqs
Amazon.in (Paperback): https://bit.ly/rohit11book
Amazon World: https://amzn.to/2WhI4om
Publisher: https://bpbonline.com/products/my-data-my-privacy-my-choice
GoogleBooks:
https://play.google.com/store/books/details/Rohit_Srivastwa_My_Data_My_Privacy_My_Cho
ice?id=bH_pDwAAQBAJ
Kobo: https://www.kobo.com/in/en/ebook/my-data-my-privacy-my-choice-a-step-by-step-
guide-to-secure-your-personal-data-and-reclaim-your-online-privacy
Good Reads: https://www.goodreads.com/book/show/53863904-my-data-my-privacy-my-
choice

More Related Content

What's hot

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social mediaAbirAhmed48
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Covert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakageCovert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakageLeMeniz Infotech
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacksmasoud khademi
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?IBM Security
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Real-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul GhaniReal-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul GhaniAbdul Ghani
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-securityiamvishal2
 
At Your Expense
At Your ExpenseAt Your Expense
At Your ExpenseDan Oblak
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 

What's hot (20)

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Covert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakageCovert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakage
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Real-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul GhaniReal-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul Ghani
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
At Your Expense
At Your ExpenseAt Your Expense
At Your Expense
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 

Similar to Book Overview - My Data My Privacy My Choice by Rohit Srivastwa

Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness ProgramDavid Wigton
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxgadisaAdamu
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014John Bambenek
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfIndianArmy38
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfIndianArmy38
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxdavezstarr61655
 
Ist264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalIst264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalHarold Sowards
 

Similar to Book Overview - My Data My Privacy My Choice by Rohit Srivastwa (20)

Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness Program
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Beginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdfBeginning Ethical Hacking with Python.pdf
Beginning Ethical Hacking with Python.pdf
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docxAshford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
Ashford 4 ­ Week 3 ­ Weekly Lecture      Weekly Lec.docx
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Ist264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournalIst264 sowards h_chapter1labjournal
Ist264 sowards h_chapter1labjournal
 

Recently uploaded

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 

Recently uploaded (20)

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 

Book Overview - My Data My Privacy My Choice by Rohit Srivastwa

  • 1. Brief Overview - My Data My Privacy My Choice This book will help you understand how much of your personal information gets freely shared on the internet without your explicit knowledge and authorization. This book will also give specific and comprehensive instructions on how you can take control of all that information. By the end of this book, you will have ensured that the information being leaked by your phone, your desktop, your browser, and your internet connection is minimal-to-none. All your online accounts for email, social networks, banking, shopping, etc. will be secure and (significantly) impervious to attackers. You will have complete control over all of your personal information that is available to public view. In fact, if you so choose, you will even be able to create ‘purposeful misinformation’ to counter any potential threats to your privacy and security, if and when necessary. Over the 15 chapters in this book, you will learn the following: Chapter 1 introduces a quick self-assessment and establishes some ‘ground-rules’ by defining various terms and concepts such as #RohitRecommends and the scoring system used throughout this book. Chapter 2 explains how various devices, services, and adversaries of all kinds have the potential to track and extract your private information by outlining basic and advanced methods to proactively identify leakage of personal information. Chapter 3 discusses the Android operating system, explores the privacy concerns surrounding them, and provides recommendations on how to deal with such issues. Chapter 4 looks at the various Apple devices available in the market, attempts to understand the privacy concerns surrounding them and provides recommendations on how to deal with such issues. Chapter 5 highlights the various issues with the app-ecosystem present in both the mobile platforms – Android and iOS – and provides recommendations on how to identify and deal with such apps. Chapter 6 explores various ‘smart’ devices available in the market and how they can impact the privacy of your personal data and provides specific recommendations on how to ensure the privacy of your personal data while using smart devices and/or IoT. Chapter 7 evaluates how known vulnerabilities in popular desktop operating systems can be exploited by malicious actors to prey on your personal data and provides recommendations on how to deal with these vulnerabilities/exploits. Chapter 8 evaluates how commonly exploited vulnerabilities in software applications can be exploited by malicious actors to prey on your personal data and provides recommendations on how to deal with these vulnerabilities/exploits.
  • 2. Chapter 9 evaluates commonly used desktop browsers, discusses how they can be exploited by malicious actors to prey on your personal data and provides recommendations on how to deal with these vulnerabilities/exploits. Chapter 10 explores the privacy issues and threats associated with accessing email, how it can be compromised by malicious actors, and provides recommendations to secure your email inbox. Chapter 11 evaluates different categories of software provided as services (a.k.a. SaaS) over the internet, i.e., Social Networks, Netbanking, Shopping websites, etc. and the privacy issues and threats to consider while accessing these services over the internet. Chapter 12 discusses the various methods of connecting to different networks (such as Broadband, Wi-Fi, GSM/CDMA, Bluetooth, NFC, etc.) and evaluates each of them from a privacy perspective. Chapter 13 discusses Operational Security (OPSEC) and presents simple Dos and Don’ts that you can follow to implement OPSEC-like behaviours in your daily routines. Chapter 14 summarizes all the learning from the previous chapters and invites you to re- assess yourself. If you did everything right up to this point, you should be able to see significant improvement over the results you received in the first chapter! Chapter 15 contains information that is important to know but a little too detailed for casual reading. You can skip this chapter if you’d like, but I strongly recommend you read it anyway. Available at Book Website: https://privacy.clinic Amazon.in (Kindle): https://amzn.to/3925Hqs Amazon.in (Paperback): https://bit.ly/rohit11book Amazon World: https://amzn.to/2WhI4om Publisher: https://bpbonline.com/products/my-data-my-privacy-my-choice GoogleBooks: https://play.google.com/store/books/details/Rohit_Srivastwa_My_Data_My_Privacy_My_Cho ice?id=bH_pDwAAQBAJ Kobo: https://www.kobo.com/in/en/ebook/my-data-my-privacy-my-choice-a-step-by-step- guide-to-secure-your-personal-data-and-reclaim-your-online-privacy Good Reads: https://www.goodreads.com/book/show/53863904-my-data-my-privacy-my- choice