Data Protection and Security for Personal Computers -  R. Schifreen

Data Protection and Security for Personal Computers (eBook)

A manager's guide to improving the confidentiality, availability and integrity of data on Personal Computers and Local Area Networks

(Autor)

eBook Download: PDF
2014 | 1. Auflage
200 Seiten
Elsevier Science (Verlag)
978-1-4832-9474-2 (ISBN)
Systemvoraussetzungen
160,00 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's - easily and effectively. Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization. Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks. UNIQUE FEATURES INCLUDE: - Totally PC and LAN specific - Practical tips and guidance - Comprehensive coverage of the topic - Unique action sheets for immediate implementation - Step-by- step coverage, easy to read, with limited technical jargon WHO SHOULD READ THIS GUIDE: - PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data. - Senior managers who wish to ensure that data on their employees PC's is safe at all times. - Managers with little computing or security experience who wish to implement a security policy throughout an organization. Please note this is a Short Discount publication.
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's - easily and effectively. Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization. Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks. UNIQUE FEATURES INCLUDE: - Totally PC and LAN specific - Practical tips and guidance - Comprehensive coverage of the topic - Unique action sheets for immediate implementation - Step-by- step coverage, easy to read, with limited technical jargon WHO SHOULD READ THIS GUIDE: - PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data. - Senior managers who wish to ensure that data on their employees PC's is safe at all times. - Managers with little computing or security experience who wish to implement a security policy throughout an organization. Please note this is a Short Discount publication.

Front Cover 1
Data Protection and Security for Personal Computers 2
Copyright Page 3
Table of Contents 6
Foreword 14
Introduction 16
Why You Need This Guide 16
Horror Stories 17
How To Read This Guide 18
THE ULTIMATE GOAL 19
Chapter 1. Where To Start 20
Analysing The Risks 20
Priorities 21
Monitoring Your Progress 21
Ignore The Press 22
Chapter 2. Security And The PC 24
The CPU Box 24
The Monitor 26
The Keyboard 28
Floppy Disks 29
The Hard Disk 34
Tape Streamers 36
The Modem 37
Fax Cards 41
The Operating System 42
DR-DOS 46
Chapter 3. What Motivates A Hacker? 50
Opportunity 50
Revenge 51
Curiosity 51
Greed 52
The Challenge 53
Chapter 4. Tricks That Hackers Use 54
Straight Past Reception 54
Keystroke Traps 56
Documentation 57
File Names 58
Refuse Areas 58
Chapter 5. The Manager's First Tasks 60
Senior Management Commitment 60
How To Inform Staff 61
Set Targets 62
Motivating Staff 62
A Sample Data Security And Integrity Policy 62
Enforcing Penalties 66
Handling Dismissals And Resignations 67
Contingency Planning 68
Chapter 6. If You Suspect A Security Breach 70
Installing Telephone Logs 70
Using Network Analysers 71
Keyboard Recorders 71
If Files Are Being Deleted 71
Involving The Police 73
Chapter 7. Employing A Security Manager 74
The Ideal Qualifications 74
The Security Manager's Duties 76
Chapter 8. Backup 80
Full And Incremental Backups 81
Backup Media 81
Choosing A Backup Program 84
Formulating A Backup Strategy 87
Motivating Staff To Take Backups 88
Verifying Backups 89
Storing Backups 89
Before Restoring 92
Chapter 9. Viruses 94
What Is A Virus? 94
Who Writes Them? 94
How Many Viruses Are There? 95
How Does One Catch A Virus? 95
Common Ways That Viruses Spread 97
How To Detect A Virus 97
What Is Not A Virus? 99
How To Protect Against Viruses 100
How To Choose A Virus Detector 101
In The Event Of An Infection 102
Chapter 10. Access Control 104
Proof Of Identity 105
Better Than Passwords 106
Controlling Information 107
Software Solutions 107
Hardware Solutions 108
Doing It Yourself 109
What To Control? 111
Chapter 11. Secure Erasure 116
Chapter 12. Preventing Hardware Theft 118
Marking The Components 118
Preventing Removal Of Equipment 118
Hardware Audits 119
Chapter 13. Controlling Software Piracy 120
Why Software Gets Pirated 120
Care of Master Disks 122
The Software Audit 123
Generating Software Audit Reports 126
Detecting Pirated Software 127
Chapter 14. Encryption 128
Choosing An Encryptor 128
DES And RSA 129
Remnants 130
Problems And Caveats 130
ZIP, ARC, LZH And Other Archive Programs 131
Chapter 15. Security For Applications Packages 132
Traceability 132
Copy Protection 133
Cracking Copy Protection 135
Chapter 16. Insurance 138
Specialist Policies 138
What To Look For In A Policy 138
Chapter 17. Software Development 142
Chinese Walls 142
Protecting Source Code 143
Programmers' Tricks 144
Resignations And Dismissals 145
Copyright Considerations 146
Chapter 18. Troubleshooting 148
A File Has Been Accidentally Deleted 148
A Disk Has Been Accidentally Formatted 149
A Hard Disk Becomes Corrupted 149
A Floppy Disk Becomes Corrupted 150
A Protected Program Is Lost 151
A Backup Fails To Restore 151
A Virus Is Suspected 152
A Floppy Disk Gets Wet 152
A Floppy Disk Gets Scratched 152
A Floppy Disk Won't Spin 153
Chapter 19. Considerations For Networks 154
Cabling 154
Welcome Screens 156
Software Packages 157
Technical Support 157
Copying From The LAN 158
Network Analysers 158
The Network Manager 159
File Permissions 159
Physical Security 160
Password Rules 162
Backing Up The LAN 163
Auditing 164
Passwords 164
Replication And Mirroring 165
Uninterruptible Power Supplies 166
Filters 166
Replacing Power Supplies 166
Login Security 167
Encryption 167
Chapter 20. Current UK Legislation 168
Data Protection Act 1984 168
Computer Misuse Act 1990 169
Interception Of Communication Act 1985 170
Copyright, Designs And Patents Act 1988 170
Companies Act 1985 171
Police And Criminal Evidence Act 1984 171
Criminal Justice Act 1988 171
Civil Evidence Act 1968 172
Telecommunications Act 1984 172
Chapter 21. Resource Guide 174
Hardware 174
Software 179
Services 189
Books And Guides 191
Index 196

Erscheint lt. Verlag 28.6.2014
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-4832-9474-9 / 1483294749
ISBN-13 978-1-4832-9474-2 / 9781483294742
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 24,4 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99