Chapter 12

Minimum Security Facilities

In This Chapter

Identifying the most serious threats to your computer and intranet

Sampling some basic security terminology

Protecting your network with firewalls, anti-malware, and encryption

Being connected to a network, especially to the Internet, comes with some security risks. Is it worth it? For most people and organizations, the answer is yes, but a few important precautions are usually necessary.

This chapter lists the nastiest muggings that can happen to your computer and a few basic security practices you can use to protect your computer and your intranet. The information in this chapter introduces the basic security vocabulary and techniques to prepare you for the application chapters that follow. Chapters 20 and 21 delve into network security in much more depth.

What’s the Worst That Could Happen?

The frequency of break-ins and hacks on the Internet grows nearly as fast as the Internet itself. If that leaves you hungry for some data safety, this chapter is the first course of your security dinner. Some of the security attacks to worry about on your own computer and intranet include

Theft: Scoundrels break onto networks or into hosts to steal computing resources and/or information.

Spoofing: E-thieves without network permissions pretend to be other people who have the necessary credentials, often by sending fake e-mail, using someone else’s access rights, or getting a host to assume the identity of another host so users access ...

Get TCP/IP For Dummies, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.