In this chapter, you will learn how to
• Define and compare types of malicious software
• Protect against malware and social engineering
• Describe browser privacy and security issues
In Chapter 11, you learned about how to protect a local computer from unauthorized access and other attacks, but connecting a computer to a network opens it up to an entirely new set of dangers. Viruses and other malicious software can sneak into your system and destroy your data from anywhere in the world. You need to know how to stop these infiltrators and recover from any successful intrusions.
This chapter looks at issues involving Internet-borne attacks and how to defend against them. Not only will ...