Computer Security for Everyone
Table of Contents


Introduction to Computer Security


Part I - Protecting Your Computer Hardware

*

Chapter 1 - Protecting Your Computer Hardware
o

Physical Access & Data Security

*

Chapter 2 - Climate and Environment

*

Chapter 3 - Backing Up Your Data
o

Data Loss
o

Data Backups and Recovery
o

Importance of Data Backup
o

Types of Data Backup
o

Backing up the Backup
o

Data Backup Tips
o

Data Safety

*

Chapter 4 - UPS Uninterruptible Power Supply
o

Regulating Your Computer's Power Supply
o

Common Power Problems
o

Types of UPS
o

Comparison of Prominent UPS Topologies
o

UPS Selection Criteria
o

UPS Buying Tips



Part II - Controlling Access to Your Computer

*

Chapter 5 - Password Protection & Management
o

Password Management
o

Login / Password Security
o

Microsoft's suggested Password Policy
o

Other Helpful Password Utilities & Links

*

Chapter 6 - Identity Theft
o

How Identity Thieves Steal your Personal Information
o

How Identity Thieves Use Your Personal Information
o

Warning Signs that you are a Victim
o

What to Do if You Are a Victim
o

How to Protect Your Identity

*

Chapter 7 - Physical Computer Access
o

Control Access to Your Computer Itself
o

Remote Access Security
o

Encryption
o

Audits
o

Active Directory
o

Public Key Infrastructure
o

Smart Cards

*

Chapter 8 - Securing Microsoft Windows
o

Windows Updates & Service Packs
o

Windows Security Overview
o

Security Policies in Windows
o

Windows System Security Tools
o

Microsoft Baseline Security Analyzer (MBSA)
o

Windows Security Tips
o

Windows Installation Security Checklist



Part III - Safeguarding Your Email Communications

*

Chapter 9 - How Email Systems Work
o

Basic Parts of the Email System
o

Email Protocols
o

Message Paths of Emails

*

Chapter 10 - Email Security
o

Vulnerabilities of the Email System
o

Email Security Guidelines & Techniques
o

Microsoft Outlook Security Features
o

Software Solutions to Email Privacy

*

Chapter 11 - Avoiding Spam
o

Introduction to Spam
o

Types of Spam
o

How Spam Works
o

How You Can Deal With Spam
o

Spam Filtering for Client-Based and Server-Based Systems
o

Spam Protection in Outlook
o

Spam Glossary
o

Free Spam Filter Tools



Part IV - Securing Your Computer System

*

Chapter 12 - Firewalls
o

Introduction to Internet Firewalls
o

Functionality of Firewalls
o

Personal Firewalls
o

Features and Benefits
o

Choosing a Firewall for Home and Small Office
o

Major Firewall Products
o

Comparison Table of the Various Personal Firewall Products

*

Chapter 13 - Networking Security
o

Networking Basics & Network Architecture
o

Computer Ports
o

Connecting to the Internet
o

Windows Network Security
o

Remote Access and VPN
o

Internet Protocols
o

Internet Protocol Security

*

Chapter 14 - Securing Your Browser
o

Introduction to Web Browsers
o

Microsoft Internet Explorer
o

Netscape Navigator and Mozilla
o

Opera
o

Securing Web Browsers

*

Chapter 15 - Antivirus Software
o

Introduction
o

The Need for Antivirus Software
o

Viruses and Worms
o

Trojan Horse Programs
o

History of Computer Viruses
o

Famous Virus & Worm Attacks
o

Guidelines to Virus Protection
o

AntiVirus Software & Utilities

*

Chapter 16 - Internet Hoaxes
o

Overview of Hoaxes
o

Hoax Definition
o

Chain Letters
o

Risks and Costs of Hoaxes
o

How to Identify a Hoax
o Action on Receiving a Hoax Mail
o

Some Well-Known Hoaxes
o

Sympathy Letters and Requests to Help Someone
o

AOL Database Corruption Scam

*

Chapter 17 - Spyware
o

Spyware: Lurking on Your Computer
o

Types and Behavior of Spyware
o

Well Known Spyware
o

Spyware To Be Extremely Wary Of
o

Programs for Detecting and Removing Spyware

*

Chapter 18 - Threats/Attacks/Hackers & Crackers
o

Introduction
o

Needed Layers of Protection
o

Hacking and Cracking
o

Threats and Attacks Defined
o

Dealing with Attacks

*

Chapter 19 - Wireless Security
o

Introduction to Wireless Networking
o

Growing Popularity of Wireless Networks
o

Wireless Protocol Standards
o

Benefits of Wireless Networks
o

Risks and Vulnerabilities
o

Security Measures for Securing Wireless Networks
o

Wireless Security Tools
o

Tips for Securing Wireless Networks

*

Chapter 20 - Guide to Linux Security
o

Introduction to Linux Security
o

Some Linux Security Precautions
o

When Your Linux System Has Already Been Compromised
o

Linux Operating System Security
o

Linux File System Security
o

Perimeter Security in Linux
o

Security Tools
o

Network Vulnerability Scanners
o

Linux Firewalls
o

Portscan Detection Tools
o

General Security Tips
o

Linux Security Glossary


Part V - Computer Security Resources

*

Chapter 21 - Free Computer Security Software
o

PC Monitoring Tools
o

File Protection Tools
o

Password Security Tools

*

Chapter 22 - Computer Security Resources on the Web

*

Chapter 23 - Glossary of Computer Security Terms
Comments: 0
Votes:7