Computer Security for Everyone
Table of Contents
Introduction to Computer Security
Part I - Protecting Your Computer Hardware
*
Chapter 1 - Protecting Your Computer Hardware
o
Physical Access & Data Security
*
Chapter 2 - Climate and Environment
*
Chapter 3 - Backing Up Your Data
o
Data Loss
o
Data Backups and Recovery
o
Importance of Data Backup
o
Types of Data Backup
o
Backing up the Backup
o
Data Backup Tips
o
Data Safety
*
Chapter 4 - UPS Uninterruptible Power Supply
o
Regulating Your Computer's Power Supply
o
Common Power Problems
o
Types of UPS
o
Comparison of Prominent UPS Topologies
o
UPS Selection Criteria
o
UPS Buying Tips
Part II - Controlling Access to Your Computer
*
Chapter 5 - Password Protection & Management
o
Password Management
o
Login / Password Security
o
Microsoft's suggested Password Policy
o
Other Helpful Password Utilities & Links
*
Chapter 6 - Identity Theft
o
How Identity Thieves Steal your Personal Information
o
How Identity Thieves Use Your Personal Information
o
Warning Signs that you are a Victim
o
What to Do if You Are a Victim
o
How to Protect Your Identity
*
Chapter 7 - Physical Computer Access
o
Control Access to Your Computer Itself
o
Remote Access Security
o
Encryption
o
Audits
o
Active Directory
o
Public Key Infrastructure
o
Smart Cards
*
Chapter 8 - Securing Microsoft Windows
o
Windows Updates & Service Packs
o
Windows Security Overview
o
Security Policies in Windows
o
Windows System Security Tools
o
Microsoft Baseline Security Analyzer (MBSA)
o
Windows Security Tips
o
Windows Installation Security Checklist
Part III - Safeguarding Your Email Communications
*
Chapter 9 - How Email Systems Work
o
Basic Parts of the Email System
o
Email Protocols
o
Message Paths of Emails
*
Chapter 10 - Email Security
o
Vulnerabilities of the Email System
o
Email Security Guidelines & Techniques
o
Microsoft Outlook Security Features
o
Software Solutions to Email Privacy
*
Chapter 11 - Avoiding Spam
o
Introduction to Spam
o
Types of Spam
o
How Spam Works
o
How You Can Deal With Spam
o
Spam Filtering for Client-Based and Server-Based Systems
o
Spam Protection in Outlook
o
Spam Glossary
o
Free Spam Filter Tools
Part IV - Securing Your Computer System
*
Chapter 12 - Firewalls
o
Introduction to Internet Firewalls
o
Functionality of Firewalls
o
Personal Firewalls
o
Features and Benefits
o
Choosing a Firewall for Home and Small Office
o
Major Firewall Products
o
Comparison Table of the Various Personal Firewall Products
*
Chapter 13 - Networking Security
o
Networking Basics & Network Architecture
o
Computer Ports
o
Connecting to the Internet
o
Windows Network Security
o
Remote Access and VPN
o
Internet Protocols
o
Internet Protocol Security
*
Chapter 14 - Securing Your Browser
o
Introduction to Web Browsers
o
Microsoft Internet Explorer
o
Netscape Navigator and Mozilla
o
Opera
o
Securing Web Browsers
*
Chapter 15 - Antivirus Software
o
Introduction
o
The Need for Antivirus Software
o
Viruses and Worms
o
Trojan Horse Programs
o
History of Computer Viruses
o
Famous Virus & Worm Attacks
o
Guidelines to Virus Protection
o
AntiVirus Software & Utilities
*
Chapter 16 - Internet Hoaxes
o
Overview of Hoaxes
o
Hoax Definition
o
Chain Letters
o
Risks and Costs of Hoaxes
o
How to Identify a Hoax
o Action on Receiving a Hoax Mail
o
Some Well-Known Hoaxes
o
Sympathy Letters and Requests to Help Someone
o
AOL Database Corruption Scam
*
Chapter 17 - Spyware
o
Spyware: Lurking on Your Computer
o
Types and Behavior of Spyware
o
Well Known Spyware
o
Spyware To Be Extremely Wary Of
o
Programs for Detecting and Removing Spyware
*
Chapter 18 - Threats/Attacks/Hackers & Crackers
o
Introduction
o
Needed Layers of Protection
o
Hacking and Cracking
o
Threats and Attacks Defined
o
Dealing with Attacks
*
Chapter 19 - Wireless Security
o
Introduction to Wireless Networking
o
Growing Popularity of Wireless Networks
o
Wireless Protocol Standards
o
Benefits of Wireless Networks
o
Risks and Vulnerabilities
o
Security Measures for Securing Wireless Networks
o
Wireless Security Tools
o
Tips for Securing Wireless Networks
*
Chapter 20 - Guide to Linux Security
o
Introduction to Linux Security
o
Some Linux Security Precautions
o
When Your Linux System Has Already Been Compromised
o
Linux Operating System Security
o
Linux File System Security
o
Perimeter Security in Linux
o
Security Tools
o
Network Vulnerability Scanners
o
Linux Firewalls
o
Portscan Detection Tools
o
General Security Tips
o
Linux Security Glossary
Part V - Computer Security Resources
*
Chapter 21 - Free Computer Security Software
o
PC Monitoring Tools
o
File Protection Tools
o
Password Security Tools
*
Chapter 22 - Computer Security Resources on the Web
*
Chapter 23 - Glossary of Computer Security Terms
Votes:7