Chapter 8

Protection Methods

Abstract

This chapter explains how to protect yourself against spying. General protection methods are covered in each chapter; however, this chapter covers what is not directly discussed in each specific chapter’s technology realm. This chapter wraps up the book as a summary and offers more tips on how to safeguard yourself and your belongings (data) from theft or harm.

Keywords

Identity Theft
Hacking
Tracking
Hardening
Theft
Surveillance
Mitigation
Reconnaissance
Web Camera
Threat
Hacker
Attack

Protect yourself!

As we end this book on how to defend yourself against surveillance and reconnaissance attacks, the best advice up front would be to protect yourself, your data, and your assets. Protect your identity. ...

Get Cyber Reconnaissance, Surveillance and Defense now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.