| |
| |
Introduction | |
| |
| |
| |
The Basics | |
| |
| |
| |
Threats From the Internet | |
| |
| |
In This Chapter | |
| |
| |
The Internet Security Hysteria | |
| |
| |
Security Risks on the Internet | |
| |
| |
Viruses and Your Computer's Health | |
| |
| |
Keeping Private in a Wired World | |
| |
| |
Summary | |
| |
| |
| |
Online Security Strategies | |
| |
| |
In This Chapter | |
| |
| |
Your Security Strategy | |
| |
| |
Summary | |
| |
| |
| |
How the Internet Works | |
| |
| |
In This Chapter | |
| |
| |
PCs, LANS, and the Internet | |
| |
| |
TCP/IP: The Language of the Internet | |
| |
| |
Order in the Chaos: Routing | |
| |
| |
Summary | |
| |
| |
| |
Network Infrastructure | |
| |
| |
In This Chapter | |
| |
| |
Twisted-Pair Ethernet | |
| |
| |
Phone-line Networking | |
| |
| |
Wireless Networking | |
| |
| |
Summary | |
| |
| |
| |
Protecting a Home PC | |
| |
| |
| |
Securing a Standalone System | |
| |
| |
In This Chapter | |
| |
| |
Security Liabilities of the Windows Networking Platform | |
| |
| |
Proper Configuration of a Windows 9x/Me Standalone System | |
| |
| |
Summary | |
| |
| |
| |
Wireless Ethernet Security | |
| |
| |
In This Chapter | |
| |
| |
Wireless Ethernet Technology | |
| |
| |
Shared Key | |
| |
| |
Wired Equivalent Privacy | |
| |
| |
MAC Address Control | |
| |
| |
Choices in Wireless Ethernet Technology | |
| |
| |
Summary | |
| |
| |
| |
Using Personal Firewall Software | |
| |
| |
In This Chapter | |
| |
| |
What to Look For in a Personal Firewall | |
| |
| |
How to Install a Personal Firewall | |
| |
| |
How to Properly Configure a Personal Firewall | |
| |
| |
Lock Panel | |
| |
| |
How to Maintain a Personal Firewall | |
| |
| |
Summary | |
| |
| |
| |
The Dangers of Viruses on the Internet | |
| |
| |
In This Chapter | |
| |
| |
What Is a Malicious Program? | |
| |
| |
Types of Viruses | |
| |
| |
The Melissa Virus | |
| |
| |
The History of Viruses | |
| |
| |
Virus Hoaxes | |
| |
| |
Summary | |
| |
| |
| |
Vaccinating Your Computer Against Viruses | |
| |
| |
In This Chapter | |
| |
| |
Scanning Techniques | |
| |
| |
Antivirus Software Packages | |
| |
| |
Installation and Configuration of Antivirus Software | |
| |
| |
Summary | |
| |
| |
| |
Securing a Home Network | |
| |
| |
| |
Overview of Firewalls | |
| |
| |
In This Chapter | |
| |
| |
Introduction to Firewalls | |
| |
| |
Why You Need a Firewall | |
| |
| |
Potential Attacks and Intrusions | |
| |
| |
How Do Firewalls Work? | |
| |
| |
Hardware Versus Software | |
| |
| |
Summary | |
| |
| |
| |
Implementing a Proxy Server | |
| |
| |
In This Chapter | |
| |
| |
What a Proxy Server Does | |
| |
| |
Proxy Server Software Currently on the Market | |
| |
| |
How to Set Up a Proxy Server | |
| |
| |
Summary | |
| |
| |
| |
Using a Broadband Router | |
| |
| |
In This Chapter | |
| |
| |
Broadband Routers Currently On the Market | |
| |
| |
How to Set Up a Broadband Router | |
| |
| |
What a Broadband Router Protects | |
| |
| |
Summary | |
| |
| |
| |
The Benefits and Risks of Telecommuting | |
| |
| |
In This Chapter | |
| |
| |
The Advantages of Telecommuting | |
| |
| |
How Telecommuting Works | |
| |
| |
Risks of Telecommuting and Possible Solutions | |
| |
| |
Summary | |
| |
| |
| |
Using Virtual Private Networks | |
| |
| |
In This Chapter | |
| |
| |
What Is a Virtual Private Network? | |
| |
| |
How Virtual Private Networks Are Used | |
| |
| |
How to Set Up a Virtual Private Network | |
| |
| |
Summary | |
| |
| |
| |
Providing Internet Services | |
| |
| |
In This Chapter | |
| |
| |
The Risks of Internet Services | |
| |
| |
Limit Incoming Ports | |
| |
| |
Isolate Services | |
| |
| |
Allowing Controlled Access with a Demilitarized Zone | |
| |
| |
Summary | |
| |
| |
| |
Privacy and Data Security | |
| |
| |
| |
Human Issues in Security | |
| |
| |
In This Chapter | |
| |
| |
Submitting Information to a Web Site | |
| |
| |
Secure Web Connections | |
| |
| |
One-Time Transactions | |
| |
| |
Physical Security | |
| |
| |
Summary | |
| |
| |
| |
Cookies | |
| |
| |
In This Chapter | |
| |
| |
What Is a Cookie? | |
| |
| |
Where Are My Cookies? | |
| |
| |
The Abuse of Cookies | |
| |
| |
How to Change Settings to Reject Cookies or to Warn when a Cookie Is Sent | |
| |
| |
When Do I Want to Accept Cookies? | |
| |
| |
Cookie Software | |
| |
| |
Other Possible Solutions to Cookies | |
| |
| |
Summary | |
| |
| |
| |
Anonymous Surfing | |
| |
| |
In This Chapter | |
| |
| |
What Is Anonymous Surfing? | |
| |
| |
Browsing the Web Anonymously | |
| |
| |
Using E-mail Anonymously | |
| |
| |
Summary | |
| |
| |
| |
Encryption | |
| |
| |
In This Chapter | |
| |
| |
What Is Encryption? | |
| |
| |
Encryption Basics | |
| |
| |
How to Use Encryption | |
| |
| |
The Pretty Good Privacy Encryption Tool | |
| |
| |
Summary | |
| |
| |
| |
Testing and Recovery | |
| |
| |
| |
Testing Your Security by Attacking Yourself | |
| |
| |
In This Chapter | |
| |
| |
Why Attack Yourself? | |
| |
| |
Basic Principles of Self Attacks | |
| |
| |
Online Port Scanning Services | |
| |
| |
Port Scanning Software | |
| |
| |
Summary | |
| |
| |
| |
Managing Your Logs | |
| |
| |
In This Chapter | |
| |
| |
The Role of Logs | |
| |
| |
Log Management and Analysis Strategies | |
| |
| |
Example: ZoneAlarm Logs | |
| |
| |
Example: Linksys Cable/DSL Router Logs | |
| |
| |
Example: Norton AntiVirus | |
| |
| |
Summary | |
| |
| |
| |
Recovering From a Disaster | |
| |
| |
In This Chapter | |
| |
| |
Get Offline | |
| |
| |
Have I Been Compromised? | |
| |
| |
My System Won't Boot | |
| |
| |
Recover Your Data | |
| |
| |
Analyze Your Security | |
| |
| |
Rebuild Your System | |
| |
| |
Summary | |
| |
| |
| |
Maintaining Your Protection | |
| |
| |
In This Chapter | |
| |
| |
Keep Up-To-Date About Threats | |
| |
| |
Keep Your Software and Hardware Up-To-Date | |
| |
| |
Watch for the Signs | |
| |
| |
Summary | |
| |
| |
| |
Backup Strategies | |
| |
| |
In This Chapter | |
| |
| |
What Is a Backup? | |
| |
| |
What Should You Back Up? | |
| |
| |
Strategies for Backup | |
| |
| |
Microsoft Backup Tool | |
| |
| |
Backup Devices | |
| |
| |
Summary | |
| |
| |
| |
Appendices | |
| |
| |
| |
Glossary | |
| |
| |
| |
Resources | |
| |
| |
Firewall Software and Hardware | |
| |
| |
Antivirus Software | |
| |
| |
Antivirus Information | |
| |
| |
Security Alerts and Information | |
| |
| |
Network Technology | |
| |
| |
Major Operating Systems | |
| |
| |
| |
Common TCP Services and Ports | |