You are previewing Privacy Defended: Protecting Yourself Online.
O'Reilly logo
Privacy Defended: Protecting Yourself Online

Book Description

Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.

Table of Contents

  1. Copyright
  2. About the Authors
  3. Acknowledgments
  4. Tell Us What You Think!
  5. Introduction
  6. Life in the Digital Age: Why We Want and Need Privacy
    1. The Quest for Privacy in the Information Age
      1. Growth Factors
      2. The Cost of Privacy
      3. Case Study: Online Identity Search
      4. Points of Disclosure
      5. Chapter Descriptions
      6. Future Trends
      7. Summary
    2. Defining Privacy: Social and Legal Aspects
      1. The Historical Right to Privacy
      2. The Path to Privacy
      3. Security Versus Privacy
      4. Privacy Laws
      5. Privacy Cases
      6. Privacy Compromise
      7. Privacy Violation Consequences
      8. Privacy Policy Best Practices
      9. Summary
    3. Privacy Organizations and Initiatives
      1. Privacy Organizations
      2. New Initiatives
      3. Summary
  7. The Enemy Is Out There: Threats to Individual Privacy
    1. Legal Threats to Individual Privacy
      1. Reasons for Privacy Laws
      2. Threats to Privacy
      3. Individual Threats to Privacy
      4. Government Threats to Privacy
      5. Business Threats to Privacy
      6. Technologies for Legal Privacy Invasion
      7. Summary
    2. Illegal Threats to Individual Privacy
      1. Hackers
      2. Business Threats
      3. Credit Card Theft
      4. Spyware
      5. Government Threats
      6. Identity Theft
      7. Fraud
      8. Summary
  8. Dangerous Territory: Protecting Your Privacy in the Online Environment
    1. Understanding the Online Environment: Addresses, Domains, and Anonymity
      1. IP, Anyone?
      2. TCP/IP Addresses
      3. The Domain Name System
      4. Anonymity on the Internet
      5. Current Trends
      6. Summary
    2. Understanding the Online Environment: Web Surfing and Online Payment Systems
      1. Site and Portal Registrations
      2. The Web of Marketing
      3. Third-Party Content
      4. Can You Trust Them?
      5. Contests and Freebies
      6. Precautions for Web Surfing
      7. Cookies
      8. Web Bugs: Nasty Little Critters?
      9. Solutions: Web Surfing, Personal Information, Web Bugs, and More
      10. Spyware
      11. Shopping on the Internet
      12. Summary
    3. E-mail Security
      1. The Mechanics of E-mail
      2. The Dangers of E-mail
      3. Where Does E-mail Go, and Who Can Access It?
      4. Spoofing and Spamming
      5. Viruses, Trojans, and Worms
      6. Pretty Good Privacy: Encrypted, Sealed, and Signed E-mail
      7. E-mail Solutions
      8. Secure Web-Based E-mail Solutions: Yahoo!/Zixit Mail, HushMail, and LokMail
      9. Looking for More E-mail Solutions?
      10. Alternatives to PGP
      11. Summary
  9. Ground Zero: Securing Your PC Against a Hostile World
    1. Securing Your Internet Transactions with SSL and Digital Certificates
      1. What Is SSL?
      2. Why Do We Use SSL?
      3. A Brief History of SSL
      4. SSL Technically Speaking
      5. Key Lengths and Encryption Strength
      6. Configuring Your Web Browser for SSL
      7. SSL Doesn't Protect Everything
      8. Attacks on SSL
      9. What Are Digital Certificates?
      10. What Are Digital Signatures?
      11. The Almighty Certificate Authority
      12. Problems with Certificates
      13. Summary
    2. Understanding Your PC Operating System and Its Security Features
      1. Footprinting Analysis
      2. Vulnerability Information and Resources
      3. Physical Security
      4. Controlling Logical Computer Access
      5. Patches and Updates
      6. User Accounts and File Security
      7. Security Resources: Share-Level and User-Level
      8. Using Policy Editor and Enforcing Password Security
      9. Password-Protecting the Screensaver
      10. Service Packs
      11. Windows NT Passwords
      12. The Windows NT Audit Policy
      13. Users and Groups
      14. NTFS File and Directory Settings
      15. Sharing Folders
      16. The Windows NT Registry
      17. Encrypting File Systems
      18. File and Directory Settings
      19. Lockdown Steps
      20. Local Security Policy
      21. Port Restrictions
      22. IPSec
      23. Unix/Linux
      24. SSL, HTTPS, S-HTTP, S/MIME, and SSH
      25. Other Tips for Your Home PC
      26. Summary
    3. Securing Your Standalone PC: Broadband Connections
      1. Threats Recapped
      2. Cable Access
      3. Digital Subscriber Line
      4. Dial-Up ISPs
      5. DSL Versus Cable Versus Dial-Up
      6. Personal Firewalls
      7. Comparison Chart
      8. Feature Comparison
      9. Summary
    4. Securing Your Standalone PC: Viruses, Chat, and Encryption
      1. Virus Infections
      2. Privacy and Instant Messaging
      3. Home Encryption
      4. Threats
      5. Encryption Systems
      6. Securing Files on the System
      7. Product Comparison: Personal File Encryption
      8. Encryption Algorithms
      9. Password Examples
      10. The Dark Side of Encryption
      11. Summary
    5. Securing Your Home Network
      1. The Growth of Home Networking
      2. Broadband Connectivity
      3. The Need for Home Networks
      4. Problems with Home Networks
      5. Network Design
      6. Firewall Configuration: WinRoute
      7. Additional Internal Network Protection
      8. Messaging Services
      9. Secure Filter Rule Settings
      10. Troubleshooting Potential Problems
      11. The Ideal Firewall
      12. Traffic Analysis
      13. Why Test Network Security?
      14. Security Testing Procedures
      15. Security Checklist
      16. Summary
  10. New Targets of Opportunity: Protecting Privacy Beyond the PC
    1. Securing Your Privacy Using Other Digital Devices
      1. PDAs
      2. Viruses, Trojan Horses, and Malware
      3. Mobile Phones
      4. Bluetooth
      5. Research In Motion's Blackberry
      6. Backup and Other Options
      7. The Wireless Threat
      8. The Benefits of Wireless Technology
      9. How Does Wireless Work?
      10. Basic Security Features
      11. Disadvantages of Wireless
      12. How Your Security and Privacy Are at Risk
      13. What Kinds of Attacks Are Out There?
      14. Wired Equivalent Privacy Weaknesses
      15. Misconfiguration
      16. Sniffing, Interception, and Monitoring
      17. How Can You Protect Yourself?
      18. Sample Wireless Products
      19. Summary
  11. Fighting Back: What to Do if Your Privacy Is Compromised
    1. Parental Controls
      1. Benefits to Children
      2. Threats to Children
      3. Implementing Controls
      4. Third-Party Products
      5. Government Involvement
      6. Summary
    2. Guarding Your System Against Hacking
      1. What Is a System Compromise?
      2. What Is Intrusion Detection?
      3. Collecting Evidence
      4. Detecting a Compromise
      5. Security Maintenance Measures
      6. Defining Baseline Security Standards
      7. Summary
  12. Appendixes
    1. Personal Firewall Software
    2. Antivirus and Anti-Trojan Horse Software
    3. Parental Control Technology
    4. Encryption and Privacy Software
    5. Selected References
        1. Chapter 2
        2. Chapter 3
        3. Chapter 4
        4. Chapter 5
        5. Chapter 11
        6. Chapter 14
        7. Chapter 16
  13. Index