Computer Security for Everyone
		
		
		
			
Table of Contents
Introduction to Computer Security
Part I - Protecting Your Computer Hardware
    *
      Chapter  1 - Protecting Your Computer Hardware
          o
            Physical Access & Data Security
    *
      Chapter  2 - Climate and Environment
    *
      Chapter  3 - Backing Up Your Data
          o
            Data Loss
          o
            Data Backups and Recovery
          o
            Importance of Data Backup
          o
            Types of Data Backup
          o
            Backing up the Backup
          o
            Data Backup Tips
          o
            Data Safety
    *
      Chapter  4 - UPS Uninterruptible Power Supply
          o
            Regulating Your Computer's Power Supply
          o
            Common Power Problems
          o
            Types of UPS
          o
            Comparison of Prominent UPS Topologies
          o
            UPS Selection Criteria
          o
            UPS Buying Tips 
Part II - Controlling Access to Your Computer
    *
      Chapter  5 - Password Protection & Management
          o
            Password Management
          o
            Login / Password Security
          o
            Microsoft's suggested Password Policy
          o
            Other Helpful Password Utilities & Links
    *
      Chapter  6 - Identity Theft
          o
            How Identity Thieves Steal your Personal Information
          o
            How Identity Thieves Use Your Personal Information
          o
            Warning Signs that you are a Victim
          o
            What to Do if You Are a Victim
          o
            How to Protect Your Identity
    *
      Chapter  7 - Physical Computer Access
          o
            Control Access to Your Computer Itself
          o
            Remote Access Security
          o
            Encryption
          o
            Audits
          o
            Active Directory
          o
            Public Key Infrastructure
          o
            Smart Cards
    *
      Chapter  8 - Securing Microsoft Windows
          o
            Windows Updates & Service Packs
          o
            Windows Security Overview
          o
            Security Policies in Windows
          o
            Windows System Security Tools
          o
            Microsoft Baseline Security Analyzer (MBSA)
          o
            Windows  Security Tips
          o
            Windows Installation Security Checklist 
Part III - Safeguarding Your Email Communications
    *
      Chapter 9 - How Email Systems Work
          o
            Basic Parts of the Email System
          o
            Email Protocols
          o
            Message Paths of Emails
    *
      Chapter 10 - Email Security
          o
            Vulnerabilities of the Email System
          o
            Email Security Guidelines & Techniques
          o
            Microsoft Outlook Security Features
          o
            Software Solutions to Email Privacy
    *
      Chapter 11 - Avoiding Spam
          o
            Introduction to Spam
          o
            Types of Spam
          o
            How Spam Works
          o
            How You Can Deal With Spam
          o
            Spam Filtering for Client-Based and Server-Based Systems
          o
            Spam Protection in Outlook
          o
            Spam Glossary
          o
            Free Spam Filter Tools 
Part IV - Securing Your Computer System
    *
      Chapter 12 - Firewalls
          o
            Introduction to Internet Firewalls
          o
            Functionality of Firewalls
          o
            Personal Firewalls
          o
            Features and Benefits
          o
            Choosing a Firewall for Home and Small Office
          o
            Major Firewall Products
          o
            Comparison Table of the Various Personal Firewall Products
    *
      Chapter 13 - Networking Security
          o
            Networking Basics & Network Architecture
          o
            Computer Ports
          o
            Connecting to the Internet
          o
            Windows Network Security
          o
            Remote Access and VPN
          o
            Internet Protocols
          o
            Internet Protocol Security
    *
      Chapter 14 - Securing Your Browser
          o
            Introduction to Web Browsers
          o
            Microsoft Internet Explorer
          o
            Netscape Navigator and Mozilla
          o
            Opera
          o
            Securing Web Browsers
    *
      Chapter 15 - Antivirus Software
          o
            Introduction
          o
            The Need for Antivirus Software
          o
            Viruses and Worms
          o
            Trojan Horse Programs
          o
            History of Computer Viruses
          o
            Famous Virus & Worm Attacks
          o
            Guidelines to Virus Protection
          o
            AntiVirus Software & Utilities
    *
      Chapter 16 - Internet Hoaxes
          o
            Overview of Hoaxes
          o
            Hoax Definition
          o
            Chain Letters
          o
            Risks and Costs of Hoaxes
          o
            How to Identify a Hoax
          o Action on Receiving a Hoax Mail
          o
            Some Well-Known Hoaxes
          o
            Sympathy Letters and Requests to Help Someone
          o
            AOL Database Corruption Scam
    *
      Chapter 17 - Spyware
          o
            Spyware: Lurking on Your Computer
          o
            Types and Behavior of Spyware
          o
            Well Known Spyware
          o
            Spyware To Be Extremely Wary Of
          o
            Programs for Detecting and Removing Spyware
    *
      Chapter 18 - Threats/Attacks/Hackers & Crackers
          o
            Introduction
          o
            Needed Layers of Protection
          o
            Hacking and Cracking
          o
            Threats and Attacks Defined
          o
            Dealing with Attacks
    *
      Chapter 19 - Wireless Security
          o
            Introduction to Wireless Networking
          o
            Growing Popularity of Wireless Networks
          o
            Wireless Protocol Standards
          o
            Benefits of Wireless Networks
          o
            Risks and Vulnerabilities
          o
            Security Measures for Securing Wireless Networks
          o
            Wireless Security Tools
          o
            Tips for Securing Wireless Networks
    *
      Chapter 20 - Guide to Linux Security
          o
            Introduction to Linux Security
          o
            Some Linux Security Precautions
          o
            When Your Linux System Has Already Been Compromised
          o
            Linux Operating System Security
          o
            Linux File System Security
          o
            Perimeter Security in Linux
          o
            Security Tools
          o
            Network Vulnerability Scanners
          o
            Linux Firewalls
          o
            Portscan Detection Tools
          o
            General Security Tips
          o
            Linux Security Glossary
Part V - Computer Security Resources
    *
      Chapter 21 - Free Computer Security Software
          o
            PC Monitoring Tools
          o
            File Protection Tools
          o
            Password Security Tools
    *
      Chapter 22 - Computer Security Resources on the Web
    *
      Chapter 23 - Glossary of Computer Security Terms		
		
				


Votes:7