Have You Locked the Castle Gate? Home and Small Business Computer Security
Addison Wesley (Verlag)
978-0-201-71955-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Most home computer users and small businesses maintain no real, effective security on their Internet-exposed home computers or networks. Have You Locked the Castle Gate? remedies that perilous situation by guiding you through the basics of information security. The book is a friendly, easy, practical guide for every home and small business. Through real-world analogies and step-by-step procedures, Brian Shea shows how to evaluate and handle every contemporary security risk you're likely to face. Shea helps you set priorities for system security, then use the security tools built into Windows - including file and folder permissions, access limitations, personal firewalls, and more. He identifies essential safe computing practices, then walks through securing Windows servers, the Windows registry, TCP/IP connections, email services, fending off viruses, and more. Appendices include detailed Web resource lists, as well as a comprehensive security glossary. The book is a welcomed suvival kit for less-technically oriented people! For every home and small business computer user concerned about protecting their computers, communication, networks, and data.
Brian Shea is currently the team lead for a Windows security team at one of the nation's largest financial institutions. His duties include securing the bank's Windows systems and helping home users who dial in to secure their own systems. During his ten years in the computer security field, he has written everything from security programs to white papers for management and nontechnical staff. Brian lives near Seattle with his wife and daughter. When not working, he can often be found enjoying the great outdoors in the Pacific Northwest. 020171955XAB04092002
Introduction: Installing Locks in the Global Village.
Introduction.
Who Needs to Read This Book?
Why the Homestead Example?
Is the Example Important?
Introduction to the Homestead.
Is Your House Locked at Night?
What's Important Here?
Sidebar: Key Security Concepts.
Starting Out.
Important Assumptions.
It's Your Data.
Where to Look First.
How Secure Is Your System Out of the Box?
1. Assessing Risk.
Data Classification.
What Am I Protecting?
Is It Worth Protecting?
Who Am I Protecting Against?
Sidebar: Who Are They?
Risk Assessment Checklists.
2. General Network Security.
Security In-Depth, or Layered Security.
Grant All versus Deny All.
Encryption or Clear.
Sidebar: Determining “Strong Enough” and Moore's Law.
Defining Access and Rights.
Users and Their Roles.
Sidebar: Who Is the Boss? Granting Administrator Privileges.
Grouping Users.
Providing File and Directory Access.
Granting Privileges.
Sidebar: Domain versus Workgroup.
Denying Access.
Sharing Files.
Data Backups.
Selecting a Network Security Model Checklist.
3. Securing Your Computer.
Securing Your Windows System.
Sidebar: Service Packs and Hotfixes.
Sidebar: What Is the Registry?
Sidebar: Security Configuration Editor.
4. Securing Your Servers.
Why Servers Are Different.
Where to Start on Your Server Security.
Sidebar: The OSI Model.
Securing Windows NT Servers.
Sidebar: Why Protect Your Performance Data?
Sidebar: Resource Kit, MSDN, and TechNet.
Securing Windows 2000 Servers.
Server Security Checklist.
5. Connecting to the Internet.
Types of Connections.
Sidebar: Why Should You Worry?
Basic Internet Security.
Advanced Internet Security.
Sidebar: More About Encryption.
Who Is Watching You?
Privacy Issues.
Internet Security Checklist.
6. E-mail Security.
Why E-mail Is Cool.
How E-mail Works.
Security Issues with E-mail Systems.
Sidebar: Encryption in E-mail.
Sidebar: What Makes It Junk Mail?
Getting Off E-mail Lists.
E-mail Security Checklists.
7. Web Security.
What Is the World Wide Web, Really?
What They Know About You.
Cookies and Security.
Browser Security: Why Is It So Important?
Sidebar: “Sandboxes”.
Web Page Security.
E-commerce Security Issues.
Web Security Checklist.
8. Defending Against Hackers.
The Extent of the Problem.
Sidebar: Signs of a Social Engineering Attack.
Can Anyone Help?
9. Viruses, Trojan Horses, Hoaxes.
Computer Viruses and Trojan Horses.
Sidebar: Nimda, Code Red, and I Love You.
Why Should I Care?
Defending Against Threats.
Hoaxes and Why They're a Problem.
Sidebar: Crying Wolf or Real Threat?
Active Content on the Web.
Virus and Trojan Horse Security Checklist.
Appendix A. Additional Resources.
Where Can I Learn More?
Mailing Lists.
Web and FTP Sites.
Computers Incident Response Centers.
Antivirus Software.
Antivirus Resources.
Appendix B. Glossary of Security Terms and Acronyms.
Common Acronyms.
Common Security Terms.
Bibliography.
Index. 020171955XT04092002
Erscheint lt. Verlag | 14.5.2002 |
---|---|
Verlagsort | Boston |
Sprache | englisch |
Maße | 186 x 235 mm |
Gewicht | 464 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-201-71955-X / 020171955X |
ISBN-13 | 978-0-201-71955-0 / 9780201719550 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich