Essential Computer Security (2006)

essential computer security phần 1 pps

essential computer security phần 1 pps
... www.syngress.com 413 _Sec1 01_ 01. qxd 10 /9/06 4:53 PM Page Part I: Bare Essentials 413 _Sec1 01_ 01. qxd 10 /9/06 4:53 PM Page 413 _Sec1 01_ 01. qxd 10 /9/06 4:53 PM Page Chapter Basic Windows Security Topics ... 12 4 802 .11 b 12 6 802 .11 a 12 7 802 .11 g 12 7 xiii 413 _Sec1 01_ TOC.qxd xiv 10 /9/06 6:05 ... at sales@syngress.com for more information 413 _Sec1 01_ FM.qxd 10 /9/06 5:57 PM Page ii 413 _Sec1 01_ FM.qxd 10 /9/06 5:57 PM Page iii Essential Computer Security EVERYONE’S GUIDE TO E-MAIL, I N T E...
  • 31
  • 80
  • 0

essential computer security phần 2 doc

essential computer security phần 2 doc
... on your computer and whether or not they are currently enabled, you need to go into the Services Console.You can accomplish www.syngress.com 21 413_Sec101_01.qxd 22 10/9/06 4:53 PM Page 22 Chapter ... your computer Continued www.syngress.com 413_Sec101_01.qxd 10/9/06 4:53 PM Page 15 Basic Windows Security • Chapter Table 1.1 continued Windows 20 00 and Windows XP Pro Built-in Security Groups Security ... Continued www.syngress.com 19 413_Sec101_01.qxd 20 10/9/06 4:53 PM Page 20 Chapter • Basic Windows Security Table 1 .2 continued Access Levels for Windows 20 00 or Windows XP Professional File and Folder...
  • 30
  • 80
  • 0

essential computer security phần 3 potx

essential computer security phần 3 potx
... millions of computers now connected to it, was able to infect hundreds of thousands of computers and cripple the Internet in less than 30 minutes www.syngress.com 43 4 13_ Sec101_ 03. qxd 44 10/9/06 3: 14 ... (www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/usercpl_manage_passwords.mspx?mfr=true) PV27 www.syngress.com 39 4 13_ Sec101_02.qxd 10/9/06 4:56 PM Page 40 4 13_ Sec101_ 03. qxd 10/9/06 3: 14 PM Page 41 Chapter Viruses, Worms, and Other Malware Topics ... code which might be coming from your computer www.syngress.com 45 4 13_ Sec101_ 03. qxd 46 10/9/06 3: 14 PM Page 46 Chapter • Viruses, Worms, and Other Malware Figure 3. 2 McAfee VirusScan Options The...
  • 30
  • 50
  • 0

essential computer security phần 4 pptx

essential computer security phần 4 pptx
... other for added security In Figure 5 .4 you can see that a SOHO firewall sits outside the local switch on which the local computers reside Figure 5 .4 SOHO Firewall www.syngress.com 41 3_Sec101_05.qxd ... network and ensure the maximum security for your computer www.syngress.com 83 41 3_Sec101_05.qxd 84 10/9/06 3:22 PM Page 84 Chapter • Perimeter Security Summary Although it is very hard to say ... Windows Firewall Microsoft.com August 4, 20 04 (www microsoft.com/windowsxp/using /security/ internet/sp2_wfintro.mspx) www.syngress.com 41 3_Sec101_06.qxd 10/9/06 3: 24 PM Page 85 Chapter E-mail Safety...
  • 30
  • 46
  • 0

essential computer security phần 5 pps

essential computer security phần 5 pps
... Files.” Techtarget’s Security Wire Perspectives, March 4, 2004 (http://searchsecurity.techtarget.com/qna/0,289202,sid14_gci 953 548,00 html) ■ MessageLabs Intelligence 20 05 Annual Security Report (www.messagelabs.com/Threat_Watch/Intelligence_Reports/20 05_ Annual ... occur or not to occur (see Figure 7 .5) www.syngress.com 413_Sec101_07.qxd 10/9/06 3 :50 PM Page 1 15 Web Surfing Privacy and Safety • Chapter Figure 7 .5 Customize Your Security Settings You can choose ... (http://wp.netscape.com /security/ techbriefs/servercerts/index.html) ■ Weiss,Todd “New Explorer Active Scripting Flaw Reported.” Computerworld November 26, 2003 (www.computerworld.com/securitytopics /security/ holes/story/0,10801,8 758 2,00.html)...
  • 30
  • 59
  • 0

essential computer security phần 6 pdf

essential computer security phần 6 pdf
... 413_Sec101_08.qxd 1 26 10/9/ 06 3:51 PM Page 1 26 Chapter • Wireless Network Security It is important that you take the time to understand the security features of your wireless equipment ... program such as PGP to encrypt files for even more security www.syngress.com 135 413_Sec101_08.qxd 1 36 10/9/ 06 3:51 PM Page 1 36 Chapter • Wireless Network Security Password-protecting or encrypting individual ... 10/9/ 06 3:51 PM Page 129 Wireless Network Security • Chapter Make sure you change the username to something that only you would think of Just like renaming the Administrator account on your computer, ...
  • 30
  • 63
  • 0

essential computer security phần 7 ppt

essential computer security phần 7 ppt
... problem and get back to using the computer www.syngress.com 175 413_Sec101_11.qxd 176 10/9/06 4:18 PM Page 176 Chapter 11 • When Disaster Strikes Figure 11 .7 The Built-in Backup Utility in Windows ... 4, “Patching.” Windows XP Security Center The Windows XP Security Center provides a sort of one-stop shopping information dashboard for the security status of your computer Using a standard Green/Yellow/Red ... your computer Figure 10 .7 Options in the Windows XP Security Center www.syngress.com 163 413_Sec101_10.qxd 164 10/9/06 5:02 PM Page 164 Chapter 10 • Keeping Things Secure Summary Installing security...
  • 30
  • 54
  • 0

essential computer security phần 8 pot

essential computer security phần 8 pot
... environment includes a window manager Without Continued www.syngress.com 187 413_Sec101_12.qxd 188 10/9/06 4:41 PM Page 188 Chapter 12 • Microsoft Alternatives: Inside the Linux Desktop the desktop ... Gnome desktops, after version 8. 0 ■ Sawfish The default window manager for Gnome versions 8. 0 and older www.syngress.com 413_Sec101_12.qxd 10/9/06 4:41 PM Page 187 Microsoft Alternatives: Inside ... 413_Sec101_12.qxd 186 10/9/06 4:41 PM Page 186 Chapter 12 • Microsoft Alternatives: Inside the Linux Desktop Gnome or KDE environment,...
  • 30
  • 54
  • 0

essential computer security phần 9 pdf

essential computer security phần 9 pdf
... DHCP 79 Finger 80 http 110 POP3 115 SFTP 1 19 NNTP 123 137 138 1 39 143 NTP NetBIOS NetBIOS NetBIOS IMAP 161 194 220 3 89 443 SNMP IRC IMAP3 LDAP SSL 445 SMB 99 3 SIMAP 99 5 SPOD 1433 MS SQL Svr 20 49 ... 413_Sec101_AA.qxd 10 /9/ 06 5:34 PM Page 2 19 Part IV: Security Resources 2 19 413_Sec101_AA.qxd 10 /9/ 06 5:34 PM Page 220 413_Sec101_AA.qxd 10 /9/ 06 5:34 PM Page 221 Appendix A Essential Network Communications ... tcp 0 6.7.8 .9. 22 67.131.247. 194 .4026 ESTABLISHED tcp 0 6.7.8 .9. 64015 217.206.161.163.22 ESTABLISHED tcp 0 6.7.8 .9. 22 82.36.206.162.48247 ESTABLISHED tcp 0 *.80 *.* LISTEN tcp 0 * .99 3 *.* LISTEN...
  • 30
  • 56
  • 0

essential computer security phần 10 pdf

essential computer security phần 10 pdf
... Web surfing safely, 104 –112 Windows XP Security Center, using, 162–164 Security Bulletins (Microsoft), 55 security event logging, enabling, 167–169 Security Focus’s Bugtraq, 57 Security Groups, ... and acronyms that you may encounter during your efforts to learn more about computer security 253 413_Sec101_AC.qxd 254 10/ 9/06 5:42 PM Page 254 Appendix C • Glossary of Technology and Terminology ... www.syngress.com 255 413_Sec101_AC.qxd 256 10/ 9/06 5:42 PM Page 256 Appendix C • Glossary of Technology and Terminology Bug: In computer technology, a bug is a coding error in a computer program After...
  • 32
  • 61
  • 0

Tài liệu Introduction for the security : Networks and exchanges of data Computer security The risks ppt

Tài liệu Introduction for the security : Networks and exchanges of data Computer security The risks ppt
... attacks The security architecture An example Introduction for the security    Networks and exchanges of data Computer security The risks Networks and exchanges of data For the exchange of the data, ... The agenda Introduction for the security     The attacks       Networks and exchanges of data Computer security The risks Social Engineering Categories of attacks Parades for the ... a lot of data and information For the live of the company, they're critical If in the network, the security is bad, the information can be divulged and the system's properties Question : The persons...
  • 5
  • 188
  • 0

Tài liệu A Common Language for Computer Security Incidents ppt

Tài liệu A Common Language for Computer Security Incidents ppt
... –employees (attackers) who attack competitor's computers for financial gain professional criminals - attackers who attack computers for personal financial gain vandals - attackers who attack computers ... actually take place during an event For example, when a user logs in to an account, we classify the action as authenticate and the target as account The actual action that takes place is for the ... obtaining access spies - attackers who attack computers for information to be used for political gain terrorists - attackers who attack computers to cause fear for political gain corporate raiders...
  • 32
  • 215
  • 0

Tài liệu The State of Computer Security BY Marcus J. Ranum CSO Tenable Network Security, Inc. doc

Tài liệu The State of Computer Security BY Marcus J. Ranum CSO Tenable Network Security, Inc. doc
... choose from • Leverage within the organization This talk • Some History • Current State of Security • Some Extrapolation Some History • The early days of computer security: • Audit function - ... Security IPOs in the mid 1990s trigger a rush of $$$ from venture community into security Late Golden Age You are here • The worm and the pro hacker • Everyone is online • Horrible levels of vulnerability ... of vulnerability • Exposure of data and professionalization of cybercrime • Venture community pulls up stakes • Lawmakers stake out turf and arrive Current State of Security • Industry Changes...
  • 25
  • 131
  • 0

Xem thêm

Nạp tiền Tải lên
Đăng ký
Đăng nhập