Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.

* Written in easy to understand non-technical language that novices can comprehend

* Provides detailed coverage of the essential security subjects that everyone needs to know

* Covers just enough information to educate without being overwhelming
1111448522
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.

* Written in easy to understand non-technical language that novices can comprehend

* Provides detailed coverage of the essential security subjects that everyone needs to know

* Covers just enough information to educate without being overwhelming
17.99 In Stock
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

by T. Bradley
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

by T. Bradley

eBook

$17.99  $31.95 Save 44% Current price is $17.99, Original price is $31.95. You Save 44%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.

* Written in easy to understand non-technical language that novices can comprehend

* Provides detailed coverage of the essential security subjects that everyone needs to know

* Covers just enough information to educate without being overwhelming

Product Details

ISBN-13: 9780080505893
Publisher: Elsevier Science
Publication date: 11/08/2006
Sold by: Barnes & Noble
Format: eBook
Pages: 279
File size: 6 MB

About the Author

Tony Bradley, CISSP-ISSAP, is the Guide for the About.com site for Internet / Network Security. He has written for a variety of other web sites and publications including SearchSecurity.com, WindowsNetworking.com, Smart Computing Magazine and Information Security Magazine. Currently a security architect and consultant for a Fortune 100 company, Tony has driven security policies and technologies for antivirus and incident response for Fortune 500 companies and he has been network administrator and technical support for smaller companies. He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT.

He has on average over 600,000 page views per month and 25,000 subscribers to his weekly newsletter. He created a 10-part Computer Security 101 Class which has had thousands of participants since its creation and continues to gain in popularity through word of mouth.

Read an Excerpt

Essential Computer Security

EVERYONE'S GUIDE TO E-MAIL, INTERNET, AND WIRELESS SECURITY
By Tony Bradley

Syngress

Copyright © 2006 Syngress Publishing, Inc.
All right reserved.

ISBN: 978-0-08-050589-3


Chapter One

Basic Windows Security

Topic in this chapter:

* Why Do You Need to Be Secure?

* Why Are You at Risk?

[

  •  ] Summary

    [

  •  ] Additional Resources

    Introduction

    The majority of home computers use some version of Microsoft Windows as the operating system. Most of those users, either by purchasing a new computer system in the past couple of years or by upgrading, rely on a version of Windows XE

    Before we go on to the rest of this book and explore how to use different applications securely, such as Web browsers or e-mail clients, you need to understand the fundamental security of the operating system itself. This chapter will explain the following:

    * Basic risks of computer use

    * Accessing Windows

    * User accounts and Security Groups

    * File and folder security

    * Protecting Windows services

    * Dangers of hidden file extensions

    * Screen savers as security tools

    Why Do You Need to Be Secure?

    Do you want your computer to be absolutely, positively, 100-percent secure against all vulnerabilities and exploits, not only those known now, but those yet to be discovered? It's simple: leave your computer in the box, because once you turn the computer on, you begin to walk a tightrope between functionality (or convenience) and security. Unfortunately, many of the features that make your computer easier to use also create various security issues as well.

    Some people appreciate that their printer is able to communicate with the computer and alert them with messages when the ink is running low or the paper tray is empty. However, leaving the Windows Messenger Service—the service used for such communication between your printer and your computer—enabled may also leave your computer open to being inundated with unsolicited spam pop-up messages.

    One of the points of setting up a network in the first place is to share resources such as data and printers. You may want to share out files or folders so they can be accessed from other computers on the network. Unfortunately, many viruses and worms use these same connections to jump from one computer to the next and infect the whole network.

    I assume by reading this book that you do not intend to leave your computer disconnected and sealed in the box. I commend you. There is a vast world of information and productivity awaiting as long as you invest just a little time to do so securely. A little bit of knowledge applied with a little bit of common sense is enough to protect you from most computer threats.

    Microsoft has made vast improvements in the security of their operating systems and applications in the last couple of years. Windows XP Service Pack 2 made some dramatic changes aimed at making the operating system even more secure. Sadly though, the operating systems intended for home users, a market that arguably needs the security features the most, are more insecure.

    Many users view security from the perspective of "I don't have anything of value worth protecting, so why should I care?" First of all, there is a lot more of value on your computer than you may be aware of. Have you done your own income taxes on your computer and saved the files? Are there any files or documents that contain your full name? Birth date? Social Security Number? All of this information has value to someone that may want to access your financial information or steal your identity.

    The other reason to operate your computer securely is "to protect the rest of us," which is a different concept. If you leave your house unlocked and you get robbed, it really only affects you. If you leave your car unlocked and your CD stereo gets stolen, it really only affects you. But, if you leave your computer "unlocked" and it gets "stolen," it can impact other computer systems on the network or the Internet.

    Why Are You at Risk?

    It has become so common to hear about viruses, worms, identity theft, phishing scams, and other computer attacks that you may actually be wondering "where isn't there a threat?" Understanding the importance of computer security is easier, though, if you have some idea of the threats you are defending against.

    Malware

    Malware is a general term used to refer to a wide variety of malicious programs. It includes threats such as viruses, worms, Trojan horses, spyware, and any other malicious programs.

    Even if you believe you have nothing of value to protect on your computer system, leaving it unprotected can leave you vulnerable to hundreds of different malware programs floating around the Internet which could arrive in your e-mail inbox daily. These programs can accomplish a wide variety of malicious activities, including possibly capturing your passwords and credit card numbers, sending out malware to other computers or to e-mail addresses of people you know, using your computer in a denial-of-service attack against a Web site, and more.

    Weak Passwords

    Passwords are the primary method most users are familiar with for gaining access to a computer system or program. If you have a weak password and an attacker manages to guess or crack it, he or she can access your private information, steal your identity, install and execute programs using your account, and more. Even worse, some of this can be done without ever knowing your password—by using remote threats.

    Physical Security

    Physical security is admittedly less of an issue in a home environment. Generally, you aren't concerned with someone in your home sitting down at your computer and hacking into it. Nevertheless, your computer could still be stolen or lost.

    The bottom line when it comes to physical security is that once someone has physical access to your computer, the gloves are off. There are ways that an attacker sitting at your computer and using your keyboard and disk drives can bypass the various security measures you have put in place to gain access to your data.

    Network "Neighbors"

    Computers that are connected to the same network as yours or within the same range of IP addresses are able to communicate with your computer more freely and gather information easier than other computers.

    If you are using a cable modem to access the Internet, you are sharing the network with the other subscribers in your area. That means it is possible for other cable modem users in your area to view and access your drives and data if you aren't careful about how you share them out and what security measures you implement.

    These are just a few of the ways your computer and the data it contains are at risk. The following sections will walk you through securing your computer, limiting the power of users, controlling access to files and folders, and other security measures you should put in place before you start networking with other computers around you or connecting your computer to the Internet.

    Logging In

    Windows XP has a slick feature called the Welcome screen. The first time the system boots up you will be greeted with the Welcome screen like the one shown in Figure 1.1.

    Initially, you will be able to access the system, as an Administrator, simply by clicking the picture next to the username. If you assign a password to a user account, clicking the picture will open a box for you to enter the password before logging in to the system.

    On Windows XP Professional machines connected to a domain network, the Welcome screen is replaced with a login screen like Windows 2000. The user is required to press the Ctrl, Alt, and Delete keys simultaneously and then a window appears where you must enter a valid username and password to log in to the system.

    User Accounts

    A User Account is one of the primary means of controlling access to your data and resources as well as customizing Windows to look and act the way you want it to. Older versions of Windows, like Windows 95 and Windows 98, have User Profiles which allow each user to customize the look and feel of Windows, but the User Profiles offer no security whatsoever. They give an illusion of security because they are associated with a password, but anyone can simply hit the Esc key and log in to the system with the default user profile.

    The goal of this book is not necessarily to teach you every detail of User Accounts, but to show you in simple language how to set up your User Accounts in a secure fashion. The bad guys know a thing or two about the User Accounts that are installed by default. By following the advice in this section you can throw most novice hackers off the trail and thwart their attacks.

    When Windows XP is first installed, it forces you to create at least one User Account and allows you to create as many as five (see Figure 1.2). Any accounts created at this point are automatically added to the Administrators group for the machine and are created with a blank password. For these reasons, I recommend that you add only one account at this point and add other accounts later when you can control what level of access to grant and assign appropriate passwords.

    If you are upgrading from a previous Windows version, any existing users will also be automatically added to the Administrators group with a blank password when installing Windows XR One exception is that if you are installing Windows XP Professional on a system connected to a network domain rather than in a workgroup or as a stand-alone system, the installation will offer you the opportunity to create a password.

    Limiting the Number of Accounts

    In order for different users to have their own customized and personalized configurations of Windows and their own My Documents folder (among other things), they need to have their own User Accounts.

    However, the more User Accounts there are, the more targets there are for a potential attacker. Therefore, it is important to limit the number of User Accounts on the system. In a home environment, you may choose to have separate accounts for the adults, but have a single "Kids" account that they share. You definitely want to make sure you remove any duplicate or unused User Accounts.

    You can view the User Accounts by clicking User Accounts in the Control Panel. However, this view only shows you the accounts that are allowed to log in to the computer system locally. There are other hidden accounts used by the operating system or applications. To see the complete list you should view them in the Computer Management module. Unfortunately, in Windows XP Home you can't view the User Accounts in this way. Short of jumping through a ring of fire upside down while chanting Bill Gates (or some risky registry hacking), there isn't much you can do to make some of these changes. Windows XP Home users will have to just stick with making changes through the User Accounts button in the Control Panel.

    You can get to the Computer Management module a variety of ways:

    * Right-click My Computer on the desktop if you have it available and select Manage.

    * Right-click My Computer in the left-hand navigation pane of a Windows Explorer window and select Manage.

    * Click Start | All Programs | Administrative Tools, if you have it available, and select Computer Management.

    * Click Start | Run and enter compmgmt.msc to open the Computer Management module.

    Using any of these methods will open the Computer Management window (see Figure 1.3). To view the User Accounts, simply click the plus sign next to Local Users and Groups and then click Users. You will see a window similar to the one in Figure 1.3 that lists all of the User Accounts on the system. Currently disabled accounts will have a red X on them.

    You can right-click any of the User Accounts to rename them, delete them, or change their passwords. You can also select Properties to perform other tasks such as disabling the account, setting the password so that it must be changed at the next login, configuring the password so it can never be changed, and more.

    Disabling the Guest Account

    Disabling the Guest account has been recommended by security experts since the Guest account was first created. Under previous Windows versions, the Guest account had virtually no real-world purpose and served simply as another means for an attacker to gain access to a system, especially because the Guest account also has no password by default.

    (Continues...)



    Excerpted from Essential Computer Security by Tony Bradley Copyright © 2006 by Syngress Publishing, Inc.. Excerpted by permission of Syngress. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
    Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

  • Table of Contents

    1. Foreword 2. Introduction 3. Basic Windows Security 4. Passwords 5. Antivirus Software 6. Patching 7. Firewalls 8. Now You Can Connect To The Internet! 9. Email Safety 10. Web Surfing Privacy and Safety 11. Wireless Network Security 12. Spyware 13. Keeping Things Secure 14. When Disaster Strikes 15. Life Without Microsoft: Alternative Products 16. Appendix A: Getting Started – A Security Checklist 17. Appendix B: Fundamentals of Computer Networking and the Internet 18. Appendix C: Glossary of Technology and Terminology
    From the B&N Reads Blog

    Customer Reviews