Computer Security: Protecting Digital Resources: Protecting Digital ResourcesToday, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten our safety and our peace of mind. Computer Security: Protecting Digital Resources provides a broad approach to computer-related crime, electronic commerce, corporate networking, and Internet security, topics that have become increasingly important as more and more threats are made on our internet environment. This book is oriented toward the average computer user, business professional, government worker, and those within the education community, with the expectation that readers can learn to use the network with some degree of safety and security. The author places emphasis on the numerous vulnerabilities and threats that are inherent in the Internet environment. Efforts are made to present techniques and suggestions to avoid identity theft and fraud. Readers will gain a clear insight into the many security issues facing the e-commerce, networking, web, and internet environments, as well as what can be done to keep personal and business information secure. |
Contents
1 | |
Computer Systems and Networks | 107 |
Security and Operations Administration | 223 |
Security Resources Education and Standards | 317 |
Appendices | 385 |
Glossary | 429 |
443 | |
447 | |
Other editions - View all
Common terms and phrases
access control activities administrator application area network assets attacks audit authentication backup biometric browser certification Chapter CISSP communications components computer and network computer security computer system confidential configuration connection credit card database developed disk documents e-commerce e-mail electronic employees encryption ensure environment files firewall fraud functions hacker hardware host identify identity theft implemented information security infrastructure integrity interface internal Internet Internet protocol intrusion detection system intrusion prevention intrusion prevention system local area network malicious method monitoring network management network resources network security network traffic operating system organization organization's packets password phishing problem protection protocol routers scam Secure Socket Layer security issues security policy security systems server signature SNMP solutions specific spyware standard techniques telephone threats tion transactions transmission unauthorized users vendors virus viruses vulnerabilities wired wireless workstation