Chapter 1: Introduction to Computer Security
How Seriously Should You Take Threats to Network Security?
Assessing the Likelihood of an Attack on Your Network
How Do Legal Issues Impact Network Security?
Chapter 2: Networks and the Internet
The Physical Connection: Local Networks
Advanced Network Communications Topics
Media Access Control (MAC) Addresses
Chapter 3: Cyber Stalking, Fraud, and Abuse
How to Evaluate Cyber Stalking
Protecting Yourself Against Cyber Crime
Protecting Against Investment Fraud
Protecting Against Identity Theft
Chapter 4: Denial of Service Attacks
The Sasser Virus/Buffer Overflow
How Is Spyware Delivered to a Target System?
Detecting and Eliminating Viruses and Spyware
Chapter 6: Techniques Used by Hackers
National Security Agency Information Assessment Methodology
PCI Penetration Testing Standard
Chapter 7: Industrial Espionage in Cyberspace
Real-World Examples of Industrial Espionage
Example 2: University Trade Secrets
Example 6: Interactive Television Technologies, Inc.
Trends in Industrial Espionage
Spyware Used in Industrial Espionage
Steganography Used in Industrial Espionage
Protecting Against Industrial Espionage
Single-Key (Symmetric) Encryption
Modification of Symmetric Methods
Public Key (Asymmetric) Encryption
Legitimate Versus Fraudulent Encryption Methods
Cryptography Used on the Internet
Chapter 9: Computer Security Technology
How Does a Virus Scanner Work?
Benefits and Limitation of Firewalls
Commercial and Free Firewall Products
Point-to-Point Tunneling Protocol
Installing/Uninstalling Software
Final Thoughts on User Policies
Defining System Administration Policies
Standards, Guidelines, and Procedures
Payment Card Industry Data Security Standards
Chapter 11: Network Scanning and Vulnerability Scanning
Securing an Individual Workstation
Chapter 12: Cyber Terrorism and Information Warfare
Actual Cases of Cyber Terrorism
China’s Advanced Persistent Threat
Supervisory Control and Data Acquisitions (SCADA)
Defense Against Cyber Terrorism
Terrorist Recruiting and Communication
Court Records and Criminal Checks
Chapter 14: Introduction to Forensics
Image a Drive with Forensic Toolkit
Can You Ever Conduct Forensics on a Live Machine?
U.S. Secret Service Forensics Guidelines
Scientific Working Group on Digital Evidence
Locard’s Principle of Transference
Finding Evidence in the Browser
Finding Evidence in System Logs
Mobile Forensics: Cell Phone Concepts
The Need for Forensic Certification
General Computer Crime and Cyber Terrorism
18.117.99.71