The Personal Internet Security Guidebook
Keeping Hackers and Crackers out of Your HomeBy
- Tim Speed
- Juanita Ellis
- Steffano Korper
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
Personal computer users and information technology managers.
Paperback, 202 Pages
Published: October 2001
Imprint: Academic Press
"Written in an easygoing and friendly manner, the book defines and explains the terms to know, such as routers, servers, bugs, DSL, etc. Threats (such as viruses) and solutions (such as encryption systems) are included. Single computers and home network configuration scenarios are presented, with suggested approaches to consider. Topics include Internet connections, physical security, theft-prevention devices, data protection, and privacy. The book is well-written...An excellent TCP/IP appendix, glossary, and index are included. Although especially useful for readers new to computer security, this book is also recommended for experienced users as a good overall descriptitve work. All levels. --H.J. Bender, Education Process Inprovement Center, Inc.
- IntroductionVirus Worms Trojan Port Scanning File Share Attacks DOS Operating Systems (OS) Attacks Scams Chapter 1 - The InternetBeginning of TCP/IPTCP/IP and the InternetOK, Back to Reality Why Ethernet?Chapter 2 - Got DSL, Got Cable, May Have Trouble (Connecting to the Internet today) The Internet and the Home UserThe Personal Computer at Home:The Business Computer at Home:Connection TypesDial-UpISDNDSLCable ModemChapter 3 - Connecting Your Home Network to the InternetConnection TypesNetwork Interface CardsSetting Up the NICHUBRoutersWhat about Networking my MAC?Personal FirewallsChapter 4 - Securing Your DSL, Cable Modem and Dial Up ConnectionVirus ReviewLawSoftware Attacks Against You and Your PetsGood Security PracticesList of Death The Approach A Quick Overview on a Wireless Home NetworkNetwork Card or the PC The Access PointDial-up Configuration Settings WinIPCfgIPConfigJunk and SpamThe JunkThe "Spam"Chapter 5 - Physical Security and InsuranceWhere are the risks? Theft Prevention DevicesAlarmsAnti-theftSecurity Enclosures Automatic Alert System Other Considerations InsurancePC Security ChecklistChapter 6 - Data ProtectionWindows 2000 EFSA Vendor Solution (Gatekeeper)Smart CardsChapter 7 - Keep Your Data PrivateWho is Keeping US SafeHow Are You Being Tracked?The FBI and CarnivorePrivacy Tools Privacy ReferencesChapter 8 - Encryption For Your PCA History of CryptographyKey TypesHow a Public-Private encryption system worksRSA - Public and Private KeyPGPDigital SignaturesS/MIMEDigital CertificatesHow It All WorksNow the Packet SnifferSecuring the Link with SSLUsing and Managing CertificatesReference books about EncryptionSecurity Hardware and Software Reference SectionEncryptionFiltersGeneral ProtectionPersonal FirewallUser AuthenticationVirus ProtectionTCP/IP ReferenceARP and RoutingPorts DHCPGlossary of Terms