Home Page Icon
Home Page
Table of Contents for
The Enemy Is Out There: Threats to Individual Privacy
Close
The Enemy Is Out There: Threats to Individual Privacy
by Chris Weber, William Chan, Gary Bahadur
Privacy Defended: Protecting Yourself Online
Copyright
About the Authors
Acknowledgments
Tell Us What You Think!
Introduction
Life in the Digital Age: Why We Want and Need Privacy
The Quest for Privacy in the Information Age
Growth Factors
The Cost of Privacy
Case Study: Online Identity Search
Points of Disclosure
Chapter Descriptions
Future Trends
Summary
Defining Privacy: Social and Legal Aspects
The Historical Right to Privacy
The Path to Privacy
Security Versus Privacy
Privacy Laws
Privacy Cases
Privacy Compromise
Privacy Violation Consequences
Privacy Policy Best Practices
Summary
Privacy Organizations and Initiatives
Privacy Organizations
New Initiatives
Summary
The Enemy Is Out There: Threats to Individual Privacy
Legal Threats to Individual Privacy
Reasons for Privacy Laws
Threats to Privacy
Individual Threats to Privacy
Government Threats to Privacy
Business Threats to Privacy
Technologies for Legal Privacy Invasion
Summary
Illegal Threats to Individual Privacy
Hackers
Business Threats
Credit Card Theft
Spyware
Government Threats
Identity Theft
Fraud
Summary
Dangerous Territory: Protecting Your Privacy in the Online Environment
Understanding the Online Environment: Addresses, Domains, and Anonymity
IP, Anyone?
TCP/IP Addresses
The Domain Name System
Anonymity on the Internet
Current Trends
Summary
Understanding the Online Environment: Web Surfing and Online Payment Systems
Site and Portal Registrations
The Web of Marketing
Third-Party Content
Can You Trust Them?
Contests and Freebies
Precautions for Web Surfing
Cookies
Web Bugs: Nasty Little Critters?
Solutions: Web Surfing, Personal Information, Web Bugs, and More
Spyware
Shopping on the Internet
Summary
E-mail Security
The Mechanics of E-mail
The Dangers of E-mail
Where Does E-mail Go, and Who Can Access It?
Spoofing and Spamming
Viruses, Trojans, and Worms
Pretty Good Privacy: Encrypted, Sealed, and Signed E-mail
E-mail Solutions
Secure Web-Based E-mail Solutions: Yahoo!/Zixit Mail, HushMail, and LokMail
Looking for More E-mail Solutions?
Alternatives to PGP
Summary
Ground Zero: Securing Your PC Against a Hostile World
Securing Your Internet Transactions with SSL and Digital Certificates
What Is SSL?
Why Do We Use SSL?
A Brief History of SSL
SSL Technically Speaking
Key Lengths and Encryption Strength
Configuring Your Web Browser for SSL
SSL Doesn't Protect Everything
Attacks on SSL
What Are Digital Certificates?
What Are Digital Signatures?
The Almighty Certificate Authority
Problems with Certificates
Summary
Understanding Your PC Operating System and Its Security Features
Footprinting Analysis
Vulnerability Information and Resources
Physical Security
Controlling Logical Computer Access
Patches and Updates
User Accounts and File Security
Security Resources: Share-Level and User-Level
Using Policy Editor and Enforcing Password Security
Password-Protecting the Screensaver
Service Packs
Windows NT Passwords
The Windows NT Audit Policy
Users and Groups
NTFS File and Directory Settings
Sharing Folders
The Windows NT Registry
Encrypting File Systems
File and Directory Settings
Lockdown Steps
Local Security Policy
Port Restrictions
IPSec
Unix/Linux
SSL, HTTPS, S-HTTP, S/MIME, and SSH
Other Tips for Your Home PC
Summary
Securing Your Standalone PC: Broadband Connections
Threats Recapped
Cable Access
Digital Subscriber Line
Dial-Up ISPs
DSL Versus Cable Versus Dial-Up
Personal Firewalls
Comparison Chart
Feature Comparison
Summary
Securing Your Standalone PC: Viruses, Chat, and Encryption
Virus Infections
Privacy and Instant Messaging
Home Encryption
Threats
Encryption Systems
Securing Files on the System
Product Comparison: Personal File Encryption
Encryption Algorithms
Password Examples
The Dark Side of Encryption
Summary
Securing Your Home Network
The Growth of Home Networking
Broadband Connectivity
The Need for Home Networks
Problems with Home Networks
Network Design
Firewall Configuration: WinRoute
Additional Internal Network Protection
Messaging Services
Secure Filter Rule Settings
Troubleshooting Potential Problems
The Ideal Firewall
Traffic Analysis
Why Test Network Security?
Security Testing Procedures
Security Checklist
Summary
New Targets of Opportunity: Protecting Privacy Beyond the PC
Securing Your Privacy Using Other Digital Devices
PDAs
Viruses, Trojan Horses, and Malware
Mobile Phones
Bluetooth
Research In Motion's Blackberry
Backup and Other Options
The Wireless Threat
The Benefits of Wireless Technology
How Does Wireless Work?
Basic Security Features
Disadvantages of Wireless
How Your Security and Privacy Are at Risk
What Kinds of Attacks Are Out There?
Wired Equivalent Privacy Weaknesses
Misconfiguration
Sniffing, Interception, and Monitoring
How Can You Protect Yourself?
Sample Wireless Products
Summary
Fighting Back: What to Do if Your Privacy Is Compromised
Parental Controls
Benefits to Children
Threats to Children
Implementing Controls
Third-Party Products
Government Involvement
Summary
Guarding Your System Against Hacking
What Is a System Compromise?
What Is Intrusion Detection?
Collecting Evidence
Detecting a Compromise
Security Maintenance Measures
Defining Baseline Security Standards
Summary
Appendixes
Personal Firewall Software
Antivirus and Anti-Trojan Horse Software
Parental Control Technology
Encryption and Privacy Software
Selected References
Chapter 2
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 11
Chapter 14
Chapter 16
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Summary
Next
Next Chapter
Legal Threats to Individual Privacy
Part II: The Enemy Is Out There: Threats to Individual Privacy
4 Legal Threats to Individual Privacy
5 Illegal Threats to Individual Privacy
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset