Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Main Page
Table of content
Copyright
About the Authors
Acknowledgments
Tell Us What You Think!
Introduction
What's So Special About This Book?
The Problem
The Cause
The Solution
Here to Help
Part I: Life in the Digital Age: Why We Want and Need Privacy
Chapter 1. The Quest for Privacy in the Information Age
Growth Factors
The Cost of Privacy
Case Study: Online Identity Search
Points of Disclosure
Chapter Descriptions
Future Trends
Summary
Chapter 2. Defining Privacy: Social and Legal Aspects
The Historical Right to Privacy
The Path to Privacy
Security Versus Privacy
Privacy Laws
Privacy Cases
Privacy Compromise
Privacy Violation Consequences
Privacy Policy Best Practices
Summary
Chapter 3. Privacy Organizations and Initiatives
Privacy Organizations
New Initiatives
Summary
Part II: The Enemy Is Out There: Threats to Individual Privacy
Chapter 4. Legal Threats to Individual Privacy
Reasons for Privacy Laws
Threats to Privacy
Individual Threats to Privacy
Government Threats to Privacy
Business Threats to Privacy
Technologies for Legal Privacy Invasion
Summary
Chapter 5. Illegal Threats to Individual Privacy
Hackers
Business Threats
Credit Card Theft
Spyware
Government Threats
Identity Theft
Fraud
Summary
Part III: Dangerous Territory: Protecting Your Privacy in the Online Environment
Chapter 6. Understanding the Online Environment: Addresses, Domains, and Anonymity
IP, Anyone?
TCP/IP Addresses
The Domain Name System
Anonymity on the Internet
Current Trends
Summary
Chapter 7. Understanding the Online Environment: Web Surfing and Online Payment Systems
Site and Portal Registrations
The Web of Marketing
Third-Party Content
Can You Trust Them?
Contests and Freebies
Precautions for Web Surfing
Cookies
Web Bugs: Nasty Little Critters?
Solutions: Web Surfing, Personal Information, Web Bugs, and More
Spyware
Shopping on the Internet
Summary
Chapter 8. E-mail Security
The Mechanics of E-mail
The Dangers of E-mail
Where Does E-mail Go, and Who Can Access It?
Spoofing and Spamming
Viruses, Trojans, and Worms
Pretty Good Privacy: Encrypted, Sealed, and Signed E-mail
E-mail Solutions
Secure Web-Based E-mail Solutions: Yahoo!/Zixit Mail, HushMail, and LokMail
Looking for More E-mail Solutions?
Alternatives to PGP
Summary
Part IV: Ground Zero: Securing Your PC Against a Hostile World
Chapter 9. Securing Your Internet Transactions with SSL and Digital Certificates
What Is SSL?
Why Do We Use SSL?
A Brief History of SSL
SSL Technically Speaking
Key Lengths and Encryption Strength
Configuring Your Web Browser for SSL
SSL Doesn't Protect Everything
Attacks on SSL
What Are Digital Certificates?
What Are Digital Signatures?
The Almighty Certificate Authority
Problems with Certificates
Summary
Chapter 10. Understanding Your PC Operating System and Its Security Features
Footprinting Analysis
Vulnerability Information and Resources
Physical Security
Controlling Logical Computer Access
Patches and Updates
User Accounts and File Security
Security Resources: Share-Level and User-Level
Using Policy Editor and Enforcing Password Security
Password-Protecting the Screensaver
Service Packs
Windows NT Passwords
The Windows NT Audit Policy
Users and Groups
NTFS File and Directory Settings
Sharing Folders
The Windows NT Registry
Encrypting File Systems
File and Directory Settings
Lockdown Steps
Local Security Policy
Port Restrictions
IPSec
Unix/Linux
SSL, HTTPS, S-HTTP, S/MIME, and SSH
Other Tips for Your Home PC
Summary
Chapter 11. Securing Your Standalone PC: Broadband Connections
Threats Recapped
Cable Access
Digital Subscriber Line
Dial-Up ISPs
DSL Versus Cable Versus Dial-Up
Personal Firewalls
Comparison Chart
Feature Comparison
Summary
Chapter 12. Securing Your Standalone PC: Viruses, Chat, and Encryption
Virus Infections
Privacy and Instant Messaging
Home Encryption
Threats
Encryption Systems
Securing Files on the System
Product Comparison: Personal File Encryption
Encryption Algorithms
Password Examples
The Dark Side of Encryption
Summary
Chapter 13. Securing Your Home Network
The Growth of Home Networking
Broadband Connectivity
The Need for Home Networks
Problems with Home Networks
Network Design
Firewall Configuration: WinRoute
Additional Internal Network Protection
Messaging Services
Secure Filter Rule Settings
Troubleshooting Potential Problems
The Ideal Firewall
Traffic Analysis
Why Test Network Security?
Security Testing Procedures
Security Checklist
Summary
Part V: New Targets of Opportunity: Protecting Privacy Beyond the PC
Chapter 14. Securing Your Privacy Using Other Digital Devices
PDAs
Viruses, Trojan Horses, and Malware
Mobile Phones
Bluetooth
Research In Motion's Blackberry
Backup and Other Options
The Wireless Threat
The Benefits of Wireless Technology
How Does Wireless Work?
Basic Security Features
Disadvantages of Wireless
How Your Security and Privacy Are at Risk
What Kinds of Attacks Are Out There?
Wired Equivalent Privacy Weaknesses
Misconfiguration
Sniffing, Interception, and Monitoring
How Can You Protect Yourself?
Sample Wireless Products
Summary
Part VI: Fighting Back: What to Do if Your Privacy Is Compromised
Chapter 15. Parental Controls
Benefits to Children
Threats to Children
Implementing Controls
Third-Party Products
Government Involvement
Summary
Chapter 16. Guarding Your System Against Hacking
What Is a System Compromise?
What Is Intrusion Detection?
Collecting Evidence
Detecting a Compromise
Security Maintenance Measures
Defining Baseline Security Standards
Summary
Appendix VII: Appendixes
Appendix A. Personal Firewall Software
Appendix B. Antivirus and Anti-Trojan Horse Software
Appendix C. Parental Control Technology
Appendix D. Encryption and Privacy Software
Appendix E. Selected References
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Index Y
Index Z
← Prev
Back
Next →
← Prev
Back
Next →