Cargando…

Data protection and security for personal computers : a manager's guide to improving the confidentiality availability and integrity of data on personal computers and local area networks /

Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's - easily and effectively.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Schifreen, Robert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford, UK : Elsevier Advanced Technology, [1992]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; Data Protection and Security for Personal Computers; Copyright Page; Table of Contents; Foreword; Introduction; Why You Need This Guide; Horror Stories; How To Read This Guide; THE ULTIMATE GOAL; Chapter 1. Where To Start; Analysing The Risks; Priorities; Monitoring Your Progress; Ignore The Press; Chapter 2. Security And The PC; The CPU Box; The Monitor; The Keyboard; Floppy Disks; The Hard Disk; Tape Streamers; The Modem; Fax Cards; The Operating System; DR-DOS; Chapter 3. What Motivates A Hacker?; Opportunity; Revenge; Curiosity; Greed; The Challenge.
  • Chapter 4. Tricks That Hackers UseStraight Past Reception; Keystroke Traps; Documentation; File Names; Refuse Areas; Chapter 5. The Manager's First Tasks; Senior Management Commitment; How To Inform Staff; Set Targets; Motivating Staff; A Sample Data Security And Integrity Policy; Enforcing Penalties; Handling Dismissals And Resignations; Contingency Planning; Chapter 6. If You Suspect A Security Breach; Installing Telephone Logs; Using Network Analysers; Keyboard Recorders; If Files Are Being Deleted; Involving The Police; Chapter 7. Employing A Security Manager; The Ideal Qualifications.
  • The Security Manager's DutiesChapter 8. Backup; Full And Incremental Backups; Backup Media; Choosing A Backup Program; Formulating A Backup Strategy; Motivating Staff To Take Backups; Verifying Backups; Storing Backups; Before Restoring; Chapter 9. Viruses; What Is A Virus?; Who Writes Them?; How Many Viruses Are There?; How Does One Catch A Virus?; Common Ways That Viruses Spread; How To Detect A Virus; What Is Not A Virus?; How To Protect Against Viruses; How To Choose A Virus Detector; In The Event Of An Infection; Chapter 10. Access Control; Proof Of Identity; Better Than Passwords.
  • Controlling InformationSoftware Solutions; Hardware Solutions; Doing It Yourself; What To Control?; Chapter 11. Secure Erasure; Chapter 12. Preventing Hardware Theft; Marking The Components; Preventing Removal Of Equipment; Hardware Audits; Chapter 13. Controlling Software Piracy; Why Software Gets Pirated; Care of Master Disks; The Software Audit; Generating Software Audit Reports; Detecting Pirated Software; Chapter 14. Encryption; Choosing An Encryptor; DES And RSA; Remnants; Problems And Caveats; ZIP, ARC, LZH And Other Archive Programs; Chapter 15. Security For Applications Packages.
  • TraceabilityCopy Protection; Cracking Copy Protection; Chapter 16. Insurance; Specialist Policies; What To Look For In A Policy; Chapter 17. Software Development; Chinese Walls; Protecting Source Code; Programmers' Tricks; Resignations And Dismissals; Copyright Considerations; Chapter 18. Troubleshooting; A File Has Been Accidentally Deleted; A Disk Has Been Accidentally Formatted; A Hard Disk Becomes Corrupted; A Floppy Disk Becomes Corrupted; A Protected Program Is Lost; A Backup Fails To Restore; A Virus Is Suspected; A Floppy Disk Gets Wet; A Floppy Disk Gets Scratched.