did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789726056

Privacy Defended Protecting Yourself Online

by ; ;
  • ISBN13:

    9780789726056

  • ISBN10:

    078972605X

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2002-02-08
  • Publisher: Que Publishing
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $34.99

Summary

Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.

Author Biography

Gary Bahadur, a co-founder of Foundstone, Inc., and its Chief Information Officer, is responsible for the infrastructure and operations that support the consulting and training services. His areas of expertise include security architecture reviews and ethical hacking reviews focusing on Unix and Windows NT systems. Gary holds a B.S. in information systems/finance from New York University and is a Certified Information Systems Security Professional (CISSP) William Chan, Vice President of Training at Foundstone, is responsible for ensuring that the practical, real-life knowledge gained through delivering consulting services is not only funneled back into internal training, but also is incorporated into Foundstone's Hands On courses and material. Will holds a B.S. in computer science from Rensselaer Polytechnic Institute, holds an M.S. in information systems from Pace University, and is a Certified Information Systems Security Professional (CISSP) Chris Weber currently works as a security consultant for Foundstone, where he specializes in network security assessments. product testing, and security architecture. As a network engineer, Chris has designed and implemented solutions for critical 911-emergency systems nationwide. Chris holds a double B.S. in information systems and marketing from the University of North Carolina at Wilmington. His industry certifications include Microsoft Certified Systems Engineer (MCSE) and GIAC Security Essentials Certification from the SANS Institute

Table of Contents

Introduction 1(2)
What's So Special About This Book?
3(1)
The Problem
3(1)
The Cause
3(1)
The Solution
4(1)
Here to Help
4(5)
I Life in the Digital Age: Why We Want and Need Privacy
The Quest for Privacy in the Information Age
9(36)
Growth Factors
11(2)
The Cost of Privacy
13(3)
Case Study: Online Identity Search
16(1)
Points of Disclosure
17(9)
Chapter Descriptions
26(16)
Future Trends
42(2)
Summary
44(1)
Defining Privacy: Social and Legal Aspects
45(32)
The Historical Right to Privacy
46(1)
The Path to Privacy
47(5)
Security Versus Privacy
52(7)
Privacy Laws
59(4)
Privacy Cases
63(4)
Privacy Compromise
67(2)
Privacy Violation Consequences
69(1)
Privacy Policy Best Practices
70(5)
Summary
75(2)
Privacy Organizations and Initiatives
77(36)
Privacy Organizations
78(14)
New Initiatives
92(16)
Summary
108(5)
II The Enemy Is Out There: Threats to Individual Privacy
Legal Threats to Individual Privacy
113(36)
Reasons for Privacy Laws
114(1)
Threats to Privacy
115(1)
Individual Threats to Privacy
116(2)
Government Threats to Privacy
118(15)
Business Threats to Privacy
133(8)
Technologies for Legal Privacy Invasion
141(6)
Summary
147(2)
Illegal Threats to Individual Privacy
149(42)
Hackers
152(8)
Business Threats
160(4)
Credit Card Theft
164(4)
Spyware
168(2)
Government Threats
170(5)
Identity Theft
175(8)
Fraud
183(4)
Summary
187(4)
III Dangerous Territory: Protecting Your Privacy in the Online Environment
Understanding the Online Environment: Addresses, Domains, and Anonymity
191(34)
IP, Anyone?
191(1)
TCP/IP Addresses
192(5)
The Domain Name System
197(11)
Anonymity on the Internet
208(14)
Current Trends
222(2)
Summary
224(1)
Understanding the Online Environment: Web Surfing and Online Payment Systems
225(44)
Site and Portal Registrations
226(1)
The Web of Marketing
226(1)
Third-Party Content
227(2)
Can You Trust Them?
229(1)
Contests and Freebies
230(1)
Precautions for Web Surfing
230(2)
Cookies
232(17)
Web Bugs: Nasty Little Critters?
249(3)
Solutions: Web Surfing, Personal Information, Web Bugs, and More
252(6)
Spyware
258(4)
Shopping on the Internet
262(6)
Summary
268(1)
E-mail Security
269(48)
The Mechanics of E-mail
270(5)
The Dangers of E-mail
275(3)
Where Does E-mail Go, and Who Can Access It?
278(1)
Spoofing and Spamming
279(4)
Viruses, Trojans, and Worms
283(4)
Pretty Good Privacy: Encrypted, Sealed, and Signed E-mail
287(10)
E-mail Solutions
297(5)
Secure Web-Based E-mail Solutions: Yahoo!/Zixit Mail, HushMail, and LokMail
302(10)
Looking for More E-mail Solutions?
312(1)
Alternatives to PGP
313(1)
Summary
313(4)
IV Ground Zero: Securing Your PC Against a Hostile World
Securing Your Internet Transactions with SSL and Digital Certificates
317(32)
What Is SSL?
318(3)
Why Do We Use SSL?
321(1)
A Brief History of SSL
322(1)
SSL Technically Speaking
323(2)
Key Lengths and Encryption Strength
325(1)
Configuring Your Web Browser for SSL
326(5)
SSL Doesn't Protect Everything
331(1)
Attacks on SSL
332(1)
What Are Digital Certificates?
332(6)
What Are Digital Signatures?
338(2)
The Almighty Certificate Authority
340(5)
Problems with Certificates
345(2)
Summary
347(2)
Understanding Your PC Operating System and Its Security Features
349(60)
Footprinting Analysis
350(7)
Vulnerability Information and Resources
357(1)
Physical Security
358(4)
Controlling Logical Computer Access
362(5)
Patches and Updates
367(1)
User Accounts and File Security
368(1)
Security Resources: Share-Level and User-Level
368(2)
Using Policy Editor and Enforcing Password Security
370(2)
Password-Protecting the Screensaver
372(1)
Service Packs
373(1)
Windows NT Passwords
374(3)
The Windows NT Audit Policy
377(1)
Users and Groups
378(1)
NTFS File and Directory Settings
379(1)
Sharing Folders
379(2)
The Windows NT Registry
381(3)
Encrypting File Systems
384(1)
File and Directory Settings
385(2)
Lockdown Steps
387(1)
Local Security Policy
388(1)
Port Restrictions
388(2)
IPSec
390(3)
Unix/Linux
393(7)
SSL, HTTPS, S-HTTP, S/MIME, and SSH
400(1)
Other Tips for Your Home PC
401(5)
Summary
406(3)
Securing Your Standalone PC: Broadband Connections
409(58)
Threats Recapped
410(1)
Cable Access
411(1)
Digital Subscriber Line
412(2)
Dial-Up ISPs
414(1)
DSL Versus Cable Versus Dial-Up
415(1)
Personal Firewalls
416(45)
Comparison Chart
461(5)
Feature Comparison
466(1)
Summary
466(1)
Securing Your Standalone PC: Viruses, Chat, and Encryption
467(52)
Virus Infections
468(8)
Privacy and Instant Messaging
476(9)
Home Encryption
485(6)
Threats
491(1)
Encryption Systems
492(4)
Securing Files on the System
496(7)
Product Comparison: Personal File Encryption
503(5)
Encryption Algorithms
508(8)
Password Examples
516(1)
The Dark Side of Encryption
517(1)
Summary
518(1)
Securing Your Home Network
519(42)
The Growth of Home Networking
520(1)
Broadband Connectivity
521(1)
The Need for Home Networks
522(1)
Problems with Home Networks
523(2)
Network Design
525(3)
Firewall Configuration: WinRoute
528(5)
Additional Internal Network Protection
533(5)
Messaging Services
538(1)
Secure Filter Rule Settings
539(1)
Troubleshooting Potential Problems
540(1)
The Ideal Firewall
541(1)
Traffic Analysis
542(3)
Why Test Network Security?
545(2)
Security Testing Procedures
547(10)
Security Checklist
557(1)
Summary
558(3)
V New Targets of Opportunity: Protecting Privacy Beyond the PC
Securing Your Privacy Using Other Digital Devices
561(28)
PDAs
562(4)
Viruses, Trojan Horses, and Malware
566(3)
Mobile Phones
569(2)
Bluetooth
571(1)
Research In Motion's Blackberry
572(1)
Backup and Other Options
573(1)
The Wireless Threat
574(1)
The Benefits of Wireless Technology
575(1)
How Does Wireless Work?
575(2)
Basic Security Features
577(1)
Disadvantages of Wireless
578(1)
How Your Security and Privacy Are at Risk
579(1)
What Kinds of Attacks Are Out There?
579(1)
Wired Equivalent Privacy Weaknesses
580(1)
Misconfiguration
581(1)
Sniffing, Interception, and Monitoring
581(1)
How Can You Protect Yourself?
582(2)
Sample Wireless Products
584(2)
Summary
586(3)
VI Fighting Back: What to Do if Your Privacy Is Compromised
Parental Controls
589(30)
Benefits to Children
590(1)
Threats to Children
591(6)
Implementing Controls
597(8)
Third-Party Products
605(8)
Government Involvement
613(3)
Summary
616(3)
Guarding Your System Against Hacking
619(48)
What Is a System Compromise?
621(1)
What Is Intrusion Detection?
621(10)
Collecting Evidence
631(2)
Detecting a Compromise
633(7)
Security Maintenance Measures
640(5)
Defining Baseline Security Standards
645(4)
Summary
649(4)
VII Appendixes
A Personal Firewall Software
653(2)
B Antivirus and Anti-Trojan Horse Software
655(2)
C Parental Control Technology
657(2)
D Encryption and Privacy Software
659(4)
E Selected References
663(4)
Index 667

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program