Author: |
Tony Bradley & Harlan Carvey
|
Release at: | 2006 |
Pages: | 306 |
Edition: |
First Edition (Everyone's Guide to E-mail, Internet, and Wireless Seqcurity)
|
File Size: | 8 MB |
File Type: | |
Language: | English |
Description of Essential Computer Security 1st Edition (PDF)
Essential Computer Security by Tony Bradley & Harlan Carvey is a great book for Security related to digital world studies available for PDF download. When you purchase most home appliances, they come with an owner’s manual. The owner’s manual is the bible of information for that appliance. It tells you what each button does and how to set up and configure your new appliance to get it ready for operation.The owner’s manual also includes the actual steps to operate the appliance, and it often contains information on how and where to obtain service and parts, basic troubleshooting tips, and precautions you should be aware of before using the appliance.
This is true for VCRs, microwaves, toasters and vacuum cleaners.All these appliances are commonly found in an average home, and each has an assigned task.When you buy these items you buy them with their specific tasks in mind, and the owner’s manual provides all the information you need to accomplish the goal.
Most home users treat their personal computers as an appliance as well. For some users, the PC is a fancy calculator that lets them track and manage their finances. For others, it’s a means of communication that lets them send e-mail to their friends and family. For others, it’s a high-end game console that lets them play the latest action games.The list goes on and on.The bottom line is that the computer is an “appliance” that has a variety of functions, and it can be different things to different people sometimes even different things to the same person depending on what the user wants the computer to do at that moment.
Content of Essential Computer Security 1st Edition (PDF)
Part I: Bare Essentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 1 Basic Windows Security . . . . . . . . . . . . . . . . . 3
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Why Do You Need to Be Secure? . . . . . . . . . . . . . . . . . . . . .4
Why Are You at Risk? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Weak Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Network “Neighbors” . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Limiting the Number of Accounts . . . . . . . . . . . . . . .9
Disabling the Guest Account . . . . . . . . . . . . . . . . . . .11
Renaming the Administrator Account . . . . . . . . . . . .12
Creating a Dummy Administrator Account . . . . . . . .13
Security Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Windows XP Home Account Types . . . . . . . . . . . . . . . .15
FAT32 versus NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . .16
File and Folder Security . . . . . . . . . . . . . . . . . . . . . . . .16
Keeping It Simple . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Sharing and Security . . . . . . . . . . . . . . . . . . . . . . . .18
Windows Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Hidden File Extensions . . . . . . . . . . . . . . . . . . . . . . . . .24
Screen Saver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Chapter 2 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
Password Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
The Keys to Your Data . . . . . . . . . . . . . . . . . . . . . . . . .32
Selecting Strong Passwords . . . . . . . . . . . . . . . . . . . . . . .33
Password Cracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Storing Your Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
One Super-Powerful Password . . . . . . . . . . . . . . . . . . . . . . .37
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Chapter 3 Viruses, Worms, and Other Malware . . . . . . 41
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Malware Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
The History of Malware . . . . . . . . . . . . . . . . . . . . . . . . . . .43
Protect Yourself with Antivirus Software . . . . . . . . . . . . .44
Keep Your Antivirus Software Updated . . . . . . . . . . . . . .47
How Not to Get Infected . . . . . . . . . . . . . . . . . . . . . . .49
Do You Think You’re Infected? . . . . . . . . . . . . . . . . . . . .49
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Chapter 4 Patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Patch Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Why Should I Patch? . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
How Do I Know What to Patch? . . . . . . . . . . . . . . . . . . . .56
Patching Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Part II: More Essential Security . . . . . . . . . . . . . . . . . . . 65
Chapter 5 Perimeter Security. . . . . . . . . . . . . . . . . . . . . 67
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
From Moats and Bridges to Firewalls and Filters . . . . . . . . .68
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Network Traffic Flow . . . . . . . . . . . . . . . . . . . . . . . . . .70
Routers and Ports . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Packet Routing and Filtering . . . . . . . . . . . . . . . . . .72
Stateful Inspection . . . . . . . . . . . . . . . . . . . . . . . . . .73
Application Gateways and Application Proxy Firewalls . .74
Personal and Cable/DSL Router Firewalls . . . . . . . . . . .74
Intrusion Detection and Prevention . . . . . . . . . . . . . . . . . . .80
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Chapter 6 E-mail Safety . . . . . . . . . . . . . . . . . . . . . . . . . 85
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
The Evolution of E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . .86
E-mail Security Concerns . . . . . . . . . . . . . . . . . . . . . . . . . .86
Opening Attachments . . . . . . . . . . . . . . . . . . . . . . . . . .87
Web-Based versus POP3 E-mail . . . . . . . . . . . . . . . . . .91
Spoofed Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93
Hoaxes and Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
Chapter 7 Web Surfing Privacy and Safety . . . . . . . . . 103
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104
The Revolutionary World Wide Web . . . . . . . . . . . . . . . .104
Web Security Concerns . . . . . . . . . . . . . . . . . . . . . . . . . .106
Cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106
Privacy and Anonymous Surfing . . . . . . . . . . . . . . . . .109
Getting in the Zone . . . . . . . . . . . . . . . . . . . . . . . . . .112
Shopping Safely: SSL and Certificates . . . . . . . . . . . . . .116
Financial Transactions . . . . . . . . . . . . . . . . . . . . . . . . .117
Content Filtering and Childproofing . . . . . . . . . . . . . .119
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Chapter 8 Wireless Network Security . . . . . . . . . . . . . 123
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124
The Basics of Wireless Networks . . . . . . . . . . . . . . . . . . . .124
802.11b . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126
802.11a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
802.11g . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
Next-Generation Protocols . . . . . . . . . . . . . . . . . . . . .127
Basic Wireless Network Security Measures . . . . . . . . . . . . .128
Secure Your Home Wireless Network . . . . . . . . . . . . . .128
Change the SSID . . . . . . . . . . . . . . . . . . . . . . . . . .129
Configure Your Home Wireless Network . . . . . . . . .130
Restrict Access to Your Home Wireless Network . . .130
Use Encryption in Your Home Wireless Network . .131
Review Your Logs . . . . . . . . . . . . . . . . . . . . . . . . . .132
Use Public Wireless Networks Safely . . . . . . . . . . . . . .133
Install Up-to-Date Antivirus Software . . . . . . . . . . .133
Install a Personal Firewall . . . . . . . . . . . . . . . . . . . .133
Additional Hotspot Security Measures . . . . . . . . . . . . . . . .134
Verify Your Hotspot Connection . . . . . . . . . . . . . . . . .134
Watch Your Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135
Use Encryption and Password Protection . . . . . . . . . . .135
Don’t Linger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136
Use a VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136
Use Web-Based E-mail . . . . . . . . . . . . . . . . . . . . . . . .136
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .137
Chapter 9 Spyware and Adware . . . . . . . . . . . . . . . . . 139
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140
What Is Adware? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140
What Is Spyware? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144
Getting Rid of Spyware . . . . . . . . . . . . . . . . . . . . . . . . . .145
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .150
Part III: Testing and Maintenance . . . . . . . . . . . . . . . . 151
Chapter 10 Keeping Things Secure . . . . . . . . . . . . . . . 153
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154
General PC Maintenance . . . . . . . . . . . . . . . . . . . . . . . . .154
Disk Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155
Erase the PageFile . . . . . . . . . . . . . . . . . . . . . . . . . . . .157
Disk Defragmenter . . . . . . . . . . . . . . . . . . . . . . . . . . .158
Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159
Patches and Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161
Windows XP Security Center . . . . . . . . . . . . . . . . . . . . . .162
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .164
Chapter 11 When Disaster Strikes . . . . . . . . . . . . . . . . 165
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166
Check the Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . .166
Enable Security Auditing . . . . . . . . . . . . . . . . . . . . . . . . . .167
Review Your Firewall Logs . . . . . . . . . . . . . . . . . . . . . . . .170
Scan Your Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171
Restore Your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173
Start from Scratch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174
Restore Your Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
Call In the Pros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .177
Chapter 12 Microsoft Alternatives: Inside the Linux Desktop . . . . . . . . . . . . . . . . . . . . . . 179
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
Common Desktop Environments . . . . . . . . . . . . . . . . . . .180
Gnome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181
KDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183
Common Features . . . . . . . . . . . . . . . . . . . . . . . . . . . .184
Install Both, Make One the Default . . . . . . . . . . . . . . .185
Alternative Window Managers . . . . . . . . . . . . . . . . . . .185
The X Window System and Window Managers . . . . . . . . .185
X Window Servers versus Window Managers . . . . . . . .186
Window Managers as Alternative Desktop Environments . . . . . . . . . . . . . . . .188
E-mail and Personal Information Management Clients . . . .190
Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Evolution, Microsoft Exchange, Novell GroupWise, and OpenExchange . .192
KDE Suite/KMail . . . . . . . . . . . . . . . . . . . . . . . . . . . .192
Kontact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192
Aethera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193
Mozilla Mail/Thunderbird . . . . . . . . . . . . . . . . . . . . . .194
Thunderbird . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
Sylpheed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
Essential Information . . . . . . . . . . . . . . . . . . . . . . . . . .196
E-mail and PIM Software . . . . . . . . . . . . . . . . . . . . . .196
Migrating Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197
Migrating from Outlook or Outlook Express . . . . . .197
Importing Outlook Mail into Mozilla . . . . . . . . . . .198
LibPST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
Importing Outlook Mail into Evolution . . . . . . . . .199
Document Standards . . . . . . . . . . . . . . . . . . . . . . . .201
The Hard Way . . . . . . . . . . . . . . . . . . . . . . . . . . . .201
Web Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202
Mozilla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202
Mozilla and Microsoft CHAP . . . . . . . . . . . . . . . . .203
Firefox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203
Galeon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204
Konqueror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205
Opera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205
Migrating Bookmarks . . . . . . . . . . . . . . . . . . . . . . . . .206
Browser Plug-Ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206
Macromedia Flash and Shockwave/Director . . . . . . .206
RealPlayer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207
Adobe Acrobat Reader . . . . . . . . . . . . . . . . . . . . . .208
Office Application Suites . . . . . . . . . . . . . . . . . . . . . . . . . .209
OpenOffice.org . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .209
Limitations: Macros and PDF Files . . . . . . . . . . . . . .212
Future Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213
StarOffice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213
KOffice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213
Hancom Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214
Running Windows Applications on Linux . . . . . . . . . . . . .214
Compatibility Layer Software . . . . . . . . . . . . . . . . . . . .215
Wine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216
Code Weavers’ CrossOver Office . . . . . . . . . . . . . . .216
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . .218
Part IV: Security Resources. . . . . . . . . . . . . . . . . . . . . . 219
Appendix A Essential Network Communications . . . . 221
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222
Computer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222
Communication Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . .223
TCP and UDP Protocols . . . . . . . . . . . . . . . . . . . . . . . . .223
Understanding IP Addresses and DNS . . . . . . . . . . . . . . . .224
Managing IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . .226
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227
Appendix B Case Study: SOHO
(Five Computers, Printer, Servers, etc.) . . . . . . . . . . . . 229
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230
Using netstat to Determine Open Ports on a System . .230
Determining More Information with lsof . . . . . . . . . . .235
Using netstat on Windows XP . . . . . . . . . . . . . . . . . . .236
Employing a Firewall in a SOHO Environment . . . . . . . . .239
Host-Based Firewall Solutions . . . . . . . . . . . . . . . . . . .239
Introducing the SOHO Firewall Case Study . . . . . . . . . . .240
Assessing Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240
Defining the Scope of the Case Study . . . . . . . . . . . . .241
Designing the SOHO Firewall . . . . . . . . . . . . . . . . . . . . .241
Determining the Functional Requirements . . . . . . . . . .242
Determining the Needs of the Family . . . . . . . . . . .242
Talking to Local User Groups . . . . . . . . . . . . . . . . .242
Creating a Site Survey of the Home . . . . . . . . . . . . . . .243
Identifying Current Technology Options and Constraints . . . . . . . . . . . . . . . . . . . . . . .244
Implementing the SOHO Firewall . . . . . . . . . . . . . . . .245
Assembling the Components . . . . . . . . . . . . . . . . . .245
Installing the Components . . . . . . . . . . . . . . . . . . .245
Installing the Wireless Cards . . . . . . . . . . . . . . . . . .246
Testing the Configuration from Various Access Points . . . . . . . . . . . . . . . . . . .249
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .250
Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .252
Appendix C Glossary of Technology and Terminology 253
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
GET THIS BOOK |
Also Available | |
---|---|
Fenner’s Veterinary Virology 5th edition |
GET THIS BOOK |
Plant Anatomy An Applied Approach by David F Cutler, Ted Botha & D.W. Stevenson |
GET THIS BOOK |
Plant Pathology by R S Mehrotra and Ashok Aggarwal 3rd Edition |
GET THIS BOOK |
Plant Pathology The Diseased Plant by James G. Horsfall |
GET THIS BOOK |
Plant Pathology by George N Agrios 5th Edition |
GET THIS BOOK |
0 comments: