Book description
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.
Table of contents
- Copyright
- About the Authors
- Acknowledgments
- Tell Us What You Think!
- Introduction
- Life in the Digital Age: Why We Want and Need Privacy
- The Enemy Is Out There: Threats to Individual Privacy
-
Dangerous Territory: Protecting Your Privacy in the Online Environment
- Understanding the Online Environment: Addresses, Domains, and Anonymity
- Understanding the Online Environment: Web Surfing and Online Payment Systems
-
E-mail Security
- The Mechanics of E-mail
- The Dangers of E-mail
- Where Does E-mail Go, and Who Can Access It?
- Spoofing and Spamming
- Viruses, Trojans, and Worms
- Pretty Good Privacy: Encrypted, Sealed, and Signed E-mail
- E-mail Solutions
- Secure Web-Based E-mail Solutions: Yahoo!/Zixit Mail, HushMail, and LokMail
- Looking for More E-mail Solutions?
- Alternatives to PGP
- Summary
-
Ground Zero: Securing Your PC Against a Hostile World
-
Securing Your Internet Transactions with SSL and Digital Certificates
- What Is SSL?
- Why Do We Use SSL?
- A Brief History of SSL
- SSL Technically Speaking
- Key Lengths and Encryption Strength
- Configuring Your Web Browser for SSL
- SSL Doesn't Protect Everything
- Attacks on SSL
- What Are Digital Certificates?
- What Are Digital Signatures?
- The Almighty Certificate Authority
- Problems with Certificates
- Summary
-
Understanding Your PC Operating System and Its Security Features
- Footprinting Analysis
- Vulnerability Information and Resources
- Physical Security
- Controlling Logical Computer Access
- Patches and Updates
- User Accounts and File Security
- Security Resources: Share-Level and User-Level
- Using Policy Editor and Enforcing Password Security
- Password-Protecting the Screensaver
- Service Packs
- Windows NT Passwords
- The Windows NT Audit Policy
- Users and Groups
- NTFS File and Directory Settings
- Sharing Folders
- The Windows NT Registry
- Encrypting File Systems
- File and Directory Settings
- Lockdown Steps
- Local Security Policy
- Port Restrictions
- IPSec
- Unix/Linux
- SSL, HTTPS, S-HTTP, S/MIME, and SSH
- Other Tips for Your Home PC
- Summary
- Securing Your Standalone PC: Broadband Connections
- Securing Your Standalone PC: Viruses, Chat, and Encryption
-
Securing Your Home Network
- The Growth of Home Networking
- Broadband Connectivity
- The Need for Home Networks
- Problems with Home Networks
- Network Design
- Firewall Configuration: WinRoute
- Additional Internal Network Protection
- Messaging Services
- Secure Filter Rule Settings
- Troubleshooting Potential Problems
- The Ideal Firewall
- Traffic Analysis
- Why Test Network Security?
- Security Testing Procedures
- Security Checklist
- Summary
-
Securing Your Internet Transactions with SSL and Digital Certificates
-
New Targets of Opportunity: Protecting Privacy Beyond the PC
-
Securing Your Privacy Using Other Digital Devices
- PDAs
- Viruses, Trojan Horses, and Malware
- Mobile Phones
- Bluetooth
- Research In Motion's Blackberry
- Backup and Other Options
- The Wireless Threat
- The Benefits of Wireless Technology
- How Does Wireless Work?
- Basic Security Features
- Disadvantages of Wireless
- How Your Security and Privacy Are at Risk
- What Kinds of Attacks Are Out There?
- Wired Equivalent Privacy Weaknesses
- Misconfiguration
- Sniffing, Interception, and Monitoring
- How Can You Protect Yourself?
- Sample Wireless Products
- Summary
-
Securing Your Privacy Using Other Digital Devices
- Fighting Back: What to Do if Your Privacy Is Compromised
- Appendixes
- Index
Product information
- Title: Privacy Defended: Protecting Yourself Online
- Author(s):
- Release date: February 2002
- Publisher(s): Que
- ISBN: 9780789726056
You might also like
book
Access Control, Authentication, and Public Key Infrastructure
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …
book
The Basics of Digital Privacy
Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden …
book
Corporate Foreign Exchange Risk Management
A practical and accessible guide that demystifies ForEx risk for managers in all areas of business …