Essential Computer Security by Tony Bradley & Harlan Carvey (PDF)

Essential Computer Security

Author:
Tony Bradley & Harlan Carvey
Release at: 2006
Pages: 306
Edition:
First Edition (Everyone's Guide to E-mail, Internet, and Wireless Seqcurity)
File Size: 8 MB
File Type: pdf
Language: English



Description of Essential Computer Security 1st Edition (PDF)

Essential Computer Security by Tony Bradley & Harlan Carvey is a great book for Security related to digital world studies available for PDF download. When you purchase most home appliances, they come with an owner’s manual. The owner’s manual is the bible of information for that appliance. It tells you what each button does and how to set up and configure your new appliance to get it ready for operation.The owner’s manual also includes the actual steps to operate the appliance, and it often contains information on how and where to obtain service and parts, basic troubleshooting tips, and precautions you should be aware of before using the appliance.

This is true for VCRs, microwaves, toasters and vacuum cleaners.All these appliances are commonly found in an average home, and each has an assigned task.When you buy these items you buy them with their specific tasks in mind, and the owner’s manual provides all the information you need to accomplish the goal.

Most home users treat their personal computers as an appliance as well. For some users, the PC is a fancy calculator that lets them track and manage their finances. For others, it’s a means of communication that lets them send e-mail to their friends and family. For others, it’s a high-end game console that lets them play the latest action games.The list goes on and on.The bottom line is that the computer is an “appliance” that has a variety of functions, and it can be different things to different people sometimes even different things to the same person depending on what the user wants the computer to do at that moment.




Content of Essential Computer Security 1st Edition (PDF)


Part I: Bare Essentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 1 Basic Windows Security . . . . . . . . . . . . . . . . . 3

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

Why Do You Need to Be Secure? . . . . . . . . . . . . . . . . . . . . .4

Why Are You at Risk? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

Malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

Weak Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Network “Neighbors” . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

Limiting the Number of Accounts . . . . . . . . . . . . . . .9

Disabling the Guest Account . . . . . . . . . . . . . . . . . . .11

Renaming the Administrator Account . . . . . . . . . . . .12

Creating a Dummy Administrator Account . . . . . . . .13

Security Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Windows XP Home Account Types . . . . . . . . . . . . . . . .15

FAT32 versus NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . .16

File and Folder Security . . . . . . . . . . . . . . . . . . . . . . . .16

Keeping It Simple . . . . . . . . . . . . . . . . . . . . . . . . . . .17

Sharing and Security . . . . . . . . . . . . . . . . . . . . . . . .18

Windows Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Hidden File Extensions . . . . . . . . . . . . . . . . . . . . . . . . .24

Screen Saver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Chapter 2 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

Password Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

The Keys to Your Data . . . . . . . . . . . . . . . . . . . . . . . . .32

Selecting Strong Passwords . . . . . . . . . . . . . . . . . . . . . . .33

Password Cracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

Storing Your Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

One Super-Powerful Password . . . . . . . . . . . . . . . . . . . . . . .37

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

Chapter 3 Viruses, Worms, and Other Malware . . . . . . 41

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

Malware Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

The History of Malware . . . . . . . . . . . . . . . . . . . . . . . . . . .43

Protect Yourself with Antivirus Software . . . . . . . . . . . . .44

Keep Your Antivirus Software Updated . . . . . . . . . . . . . .47

How Not to Get Infected . . . . . . . . . . . . . . . . . . . . . . .49

Do You Think You’re Infected? . . . . . . . . . . . . . . . . . . . .49

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52

Chapter 4 Patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

Patch Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

Why Should I Patch? . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55

How Do I Know What to Patch? . . . . . . . . . . . . . . . . . . . .56

Patching Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . .60

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64

Part II: More Essential Security . . . . . . . . . . . . . . . . . . . 65

Chapter 5 Perimeter Security. . . . . . . . . . . . . . . . . . . . . 67

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68

From Moats and Bridges to Firewalls and Filters . . . . . . . . .68

Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

Network Traffic Flow . . . . . . . . . . . . . . . . . . . . . . . . . .70

Routers and Ports . . . . . . . . . . . . . . . . . . . . . . . . . . .71

Packet Routing and Filtering . . . . . . . . . . . . . . . . . .72

Stateful Inspection . . . . . . . . . . . . . . . . . . . . . . . . . .73

Application Gateways and Application Proxy Firewalls . .74

Personal and Cable/DSL Router Firewalls . . . . . . . . . . .74

Intrusion Detection and Prevention . . . . . . . . . . . . . . . . . . .80

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84

Chapter 6 E-mail Safety . . . . . . . . . . . . . . . . . . . . . . . . . 85

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

The Evolution of E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . .86

E-mail Security Concerns . . . . . . . . . . . . . . . . . . . . . . . . . .86

Opening Attachments . . . . . . . . . . . . . . . . . . . . . . . . . .87

Web-Based versus POP3 E-mail . . . . . . . . . . . . . . . . . .91

Spoofed Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92

Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

Hoaxes and Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . .97

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .102

Chapter 7 Web Surfing Privacy and Safety . . . . . . . . . 103

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104

The Revolutionary World Wide Web . . . . . . . . . . . . . . . .104

Web Security Concerns . . . . . . . . . . . . . . . . . . . . . . . . . .106

Cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106

Privacy and Anonymous Surfing . . . . . . . . . . . . . . . . .109

Getting in the Zone . . . . . . . . . . . . . . . . . . . . . . . . . .112

Shopping Safely: SSL and Certificates . . . . . . . . . . . . . .116

Financial Transactions . . . . . . . . . . . . . . . . . . . . . . . . .117

Content Filtering and Childproofing . . . . . . . . . . . . . .119

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .121

Chapter 8 Wireless Network Security . . . . . . . . . . . . . 123

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124

The Basics of Wireless Networks . . . . . . . . . . . . . . . . . . . .124

802.11b . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126

802.11a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127

802.11g . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127

Next-Generation Protocols . . . . . . . . . . . . . . . . . . . . .127

Basic Wireless Network Security Measures . . . . . . . . . . . . .128

Secure Your Home Wireless Network . . . . . . . . . . . . . .128

Change the SSID . . . . . . . . . . . . . . . . . . . . . . . . . .129

Configure Your Home Wireless Network . . . . . . . . .130

Restrict Access to Your Home Wireless Network . . .130

Use Encryption in Your Home Wireless Network . .131

Review Your Logs . . . . . . . . . . . . . . . . . . . . . . . . . .132

Use Public Wireless Networks Safely . . . . . . . . . . . . . .133

Install Up-to-Date Antivirus Software . . . . . . . . . . .133

Install a Personal Firewall . . . . . . . . . . . . . . . . . . . .133

Additional Hotspot Security Measures . . . . . . . . . . . . . . . .134

Verify Your Hotspot Connection . . . . . . . . . . . . . . . . .134

Watch Your Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135

Use Encryption and Password Protection . . . . . . . . . . .135

Don’t Linger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136

Use a VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136

Use Web-Based E-mail . . . . . . . . . . . . . . . . . . . . . . . .136

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .137

Chapter 9 Spyware and Adware . . . . . . . . . . . . . . . . . 139

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140

What Is Adware? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140

What Is Spyware? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144

Getting Rid of Spyware . . . . . . . . . . . . . . . . . . . . . . . . . .145

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .150

Part III: Testing and Maintenance . . . . . . . . . . . . . . . . 151

Chapter 10 Keeping Things Secure . . . . . . . . . . . . . . . 153

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154

General PC Maintenance . . . . . . . . . . . . . . . . . . . . . . . . .154

Disk Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155

Erase the PageFile . . . . . . . . . . . . . . . . . . . . . . . . . . . .157

Disk Defragmenter . . . . . . . . . . . . . . . . . . . . . . . . . . .158

Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159

Patches and Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161

Windows XP Security Center . . . . . . . . . . . . . . . . . . . . . .162

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .164

Chapter 11 When Disaster Strikes . . . . . . . . . . . . . . . . 165

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166

Check the Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . .166

Enable Security Auditing . . . . . . . . . . . . . . . . . . . . . . . . . .167

Review Your Firewall Logs . . . . . . . . . . . . . . . . . . . . . . . .170

Scan Your Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171

Restore Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173

Start from Scratch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174

Restore Your Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175

Call In the Pros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .177

Chapter 12 Microsoft Alternatives: Inside the Linux Desktop . . . . . . . . . . . . . . . . . . . . . . 179

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180

Common Desktop Environments . . . . . . . . . . . . . . . . . . .180

Gnome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181

KDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183

Common Features . . . . . . . . . . . . . . . . . . . . . . . . . . . .184

Install Both, Make One the Default . . . . . . . . . . . . . . .185

Alternative Window Managers . . . . . . . . . . . . . . . . . . .185

The X Window System and Window Managers . . . . . . . . .185

X Window Servers versus Window Managers . . . . . . . .186

Window Managers as Alternative Desktop Environments . . . . . . . . . . . . . . . .188

E-mail and Personal Information Management Clients . . . .190

Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190

Evolution, Microsoft Exchange, Novell GroupWise, and OpenExchange . .192

KDE Suite/KMail . . . . . . . . . . . . . . . . . . . . . . . . . . . .192

Kontact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192

Aethera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193

Mozilla Mail/Thunderbird . . . . . . . . . . . . . . . . . . . . . .194

Thunderbird . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195

Sylpheed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195

Essential Information . . . . . . . . . . . . . . . . . . . . . . . . . .196

E-mail and PIM Software . . . . . . . . . . . . . . . . . . . . . .196

Migrating Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197

Migrating from Outlook or Outlook Express . . . . . .197

Importing Outlook Mail into Mozilla . . . . . . . . . . .198

LibPST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199

Importing Outlook Mail into Evolution . . . . . . . . .199

Document Standards . . . . . . . . . . . . . . . . . . . . . . . .201

The Hard Way . . . . . . . . . . . . . . . . . . . . . . . . . . . .201

Web Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202

Mozilla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202

Mozilla and Microsoft CHAP . . . . . . . . . . . . . . . . .203

Firefox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203

Galeon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204

Konqueror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205

Opera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205

Migrating Bookmarks . . . . . . . . . . . . . . . . . . . . . . . . .206

Browser Plug-Ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206

Macromedia Flash and Shockwave/Director . . . . . . .206

RealPlayer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207

Adobe Acrobat Reader . . . . . . . . . . . . . . . . . . . . . .208

Office Application Suites . . . . . . . . . . . . . . . . . . . . . . . . . .209

OpenOffice.org . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .209

Limitations: Macros and PDF Files . . . . . . . . . . . . . .212

Future Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213

StarOffice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213

KOffice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213

Hancom Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214

Running Windows Applications on Linux . . . . . . . . . . . . .214

Compatibility Layer Software . . . . . . . . . . . . . . . . . . . .215

Wine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216

Code Weavers’ CrossOver Office . . . . . . . . . . . . . . .216

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218

Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .218

Part IV: Security Resources. . . . . . . . . . . . . . . . . . . . . . 219

Appendix A Essential Network Communications . . . . 221

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222

Computer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222

Communication Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . .223

TCP and UDP Protocols . . . . . . . . . . . . . . . . . . . . . . . . .223

Understanding IP Addresses and DNS . . . . . . . . . . . . . . . .224

Managing IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . .226

Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227

Appendix B Case Study: SOHO

(Five Computers, Printer, Servers, etc.) . . . . . . . . . . . . 229

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230

Using netstat to Determine Open Ports on a System . .230

Determining More Information with lsof . . . . . . . . . . .235

Using netstat on Windows XP . . . . . . . . . . . . . . . . . . .236

Employing a Firewall in a SOHO Environment . . . . . . . . .239

Host-Based Firewall Solutions . . . . . . . . . . . . . . . . . . .239

Introducing the SOHO Firewall Case Study . . . . . . . . . . .240

Assessing Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240

Defining the Scope of the Case Study . . . . . . . . . . . . .241

Designing the SOHO Firewall . . . . . . . . . . . . . . . . . . . . .241

Determining the Functional Requirements . . . . . . . . . .242

Determining the Needs of the Family . . . . . . . . . . .242

Talking to Local User Groups . . . . . . . . . . . . . . . . .242

Creating a Site Survey of the Home . . . . . . . . . . . . . . .243

Identifying Current Technology Options and Constraints . . . . . . . . . . . . . . . . . . . . . . .244

Implementing the SOHO Firewall . . . . . . . . . . . . . . . .245

Assembling the Components . . . . . . . . . . . . . . . . . .245

Installing the Components . . . . . . . . . . . . . . . . . . .245

Installing the Wireless Cards . . . . . . . . . . . . . . . . . .246

Testing the Configuration from Various Access Points . . . . . . . . . . . . . . . . . . .249

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .250

Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251

Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .252

Appendix C Glossary of Technology and Terminology 253

Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
GET THIS BOOK

Also Available

Fenner’s Veterinary Virology 5th edition
GET THIS BOOK

Plant Anatomy An Applied Approach by David F Cutler, Ted Botha & D.W. Stevenson
GET THIS BOOK

Plant Pathology by R S Mehrotra and Ashok Aggarwal 3rd Edition
GET THIS BOOK

Plant Pathology The Diseased Plant by James G. Horsfall
GET THIS BOOK

Plant Pathology by George N Agrios 5th Edition
GET THIS BOOK
Similar Books

0 comments:

John Academy