text.skipToContent text.skipToNavigation

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security Everyone's Guide to Email, Internet, and Wireless Security von Bradley, T. (eBook)

  • Erscheinungsdatum: 08.11.2006
  • Verlag: Elsevier Trade Monographs
eBook (ePUB)
29,69 €
inkl. gesetzl. MwSt.
Sofort per Download lieferbar

Online verfügbar

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.
Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.
Written in easy to understand non-technical language that novices can comprehend
Provides detailed coverage of the essential security subjects that everyone needs to know
Covers just enough information to educate without being overwhelming

Tony Bradley, CISSP-ISSAP, is the Guide for the About.com site for Internet / Network Security. He has written for a variety of other web sites and publications including SearchSecurity.com, WindowsNetworking.com, Smart Computing Magazine and Information Security Magazine. Currently a security architect and consultant for a Fortune 100 company, Tony has driven security policies and technologies for antivirus and incident response for Fortune 500 companies and he has been network administrator and technical support for smaller companies. He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT.

He has on average over 600,000 page views per month and 25,000 subscribers to his weekly newsletter. He created a 10-part Computer Security 101 Class which has had thousands of participants since its creation and continues to gain in popularity through word of mouth.

Produktinformationen

    Format: ePUB
    Kopierschutz: AdobeDRM
    Seitenzahl: 279
    Erscheinungsdatum: 08.11.2006
    Sprache: Englisch
    ISBN: 9780080505893
    Verlag: Elsevier Trade Monographs
    Größe: 6005kBytes
Weiterlesen weniger lesen

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

Chapter 1 Basic Windows Security

Topics in this chapter:

Why Do You Need to Be Secure?
Why Are You at Risk?

Summary
Additional Resources Introduction

The majority of home computers use some version of Microsoft Windows as the operating system. Most of those users, either by purchasing a new computer system in the past couple of years or by upgrading, rely on a version of Windows XP.

Before we go on to the rest of this book and explore how to use different applications securely, such as Web browsers or e-mail clients, you need to understand the fundamental security of the operating system itself. This chapter will explain the following:

Basic risks of computer use
Accessing Windows
User accounts and Security Groups
File and folder security
Protecting Windows services
Dangers of hidden file extensions
Screen savers as security tools Why Do You Need to Be Secure?

Do you want your computer to be absolutely, positively, 100-percent secure against all vulnerabilities and exploits, not only those known now, but those yet to be discovered? It's simple: leave your computer in the box, because once you turn the computer on, you begin to walk a tightrope between functionality (or convenience) and security. Unfortunately, many of the features that make your computer easier to use also create various security issues as well.

Some people appreciate that their printer is able to communicate with the computer and alert them with messages when the ink is running low or the paper tray is empty. However, leaving the Windows Messenger Service-the service used for such communication between your printer and your computer-enabled may also leave your computer open to being inundated with unsolicited spam pop-up messages.

One of the points of setting up a network in the first place is to share resources such as data and printers. You may want to share out files or folders so they can be accessed from other computers on the network. Unfortunately, many viruses and worms use these same connections to jump from one computer to the next and infect the whole network.

I assume by reading this book that you do not intend to leave your computer disconnected and sealed in the box. I commend you. There is a vast world of information and productivity awaiting as long as you invest just a little time to do so securely. A little bit of knowledge applied with a little bit of common sense is enough to protect you from most computer threats.

Microsoft has made vast improvements in the security of their operating systems and applications in the last couple of years. Windows XP Service Pack 2 made some dramatic changes aimed at making the operating system even more secure. Sadly though, the operating systems intended for home users, a market that arguably needs the security features the most, are more insecure.

Many users view security from the perspective of "I don't have anything of value worth protecting, so why should I care?" First of all, there is a lot more of value on your computer than you may be aware of. Have you done your own income taxes on your computer and saved the files? Are there any files or documents that contain your full name? Birth date? Social Security Number? All of this information has value to someone that may want to access your financial information or steal your identity.

The other reason to operate your computer securely is "to protect the rest of us," which is a different concept. If you leave your house unlocked and you get robbed, it really only affects you. If you leave your car unlocked and your CD stereo gets stolen, it really only affects you. But, if you leave your computer "unlocked" and it gets "stolen," it can impact other computer sys

Weiterlesen weniger lesen

Kundenbewertungen