This chapter is about: WANs, remote access, and the Internet
...the chapter looks beyond local area networks to the broader aspects of
personal computer-based data communications. This takes in the security of
modem connections over telephone lines, remote access to personal computers
and networks, wide area networks, long distance connections between
networks, plus other forms of computer facilitated communication, such as
fax and voice. We begin with basic outbound communications from a
personal computer, then consider incoming calls, network connections.
For companies active in this field check out the following Hot Links at NCSA:
- Network and Communication Security
- Protecting LANs and WANs, modems and remote communications, PBX and voice, electronic mail protection.
- Firewalls, Internet, Intranet, and Web Security
- Internet and intranet security, web security, electronic commerce systems, Electronic Data Interchange (EDI), secure electronic transaction schemes, digital cash.
Here is an example of Web site hacking...changing the appearance of pages without permission:
- CIA Web Site Hack
- This happened in September of 1996, just a few weeks after the U.S. Department of Justice site was hacked.
The Story So Far
- No typos or errors reported so far.
- Links and supplemental info being prepared.
- Check back in 10 days for more links and info.
Table of Contents with Links to Chapters
[Top of Page] [PC LAN Security Home Page] [Table of Contents]
- Chapter 1. Security Matters: Assessing the problems, threats, and issues
- Chapter 2. Security Solutions: Basic concepts and techniques
- Chapter 3. Security Planning: Risk analysis and security policy
- Chapter 4. Secure Hardware: Defending and insuring equipment
- Chapter 5. Secure Power: Spikes, Sparks, and Electrical Threats
- Chapter 6. Secure Sites: Defending sites and systems
- Chapter 7. Secure Access: Controls, passwords, and encryption
- Chapter 8. Secure Data: Backup, backup, backup
- Chapter 9. Secure Code: Defeating viruses, worms and other malicious code
- Chapter 10. Secure Software: Piracy, bugs, and other "soft" threats
- Chapter 11. Secure Networks I: Generic network defense
- Chapter 12. Secure Networks II: Protecting name brand networks
- Chapter 13. Secure Communications: WANs, remote access, and the Internet
- Chapter 14. Secure People: Hacking and ethical issues
- Chapter 15. Security in the Future: How to become and remain secure
- Appendix A: Threat List
- Appendix B: A Brief Guide to Batch Files
- Appendix C: Computer Security Policy
- Appendix D: Notes on EMR
- Appendix E: Export Restrictions on Encryption
- Appendix F: Further Resources
- Appendix G: Glossary
- Appendix H: How Public Key Encryption Works
- Appendix I: Introduction to LANs
- Appendix J: Securing Safe Software
- Appendix K: Appraising Microsoft AV
This page updated by Stephen Cobb, Summer 2002 © Copyright, 1996-2002, Stephen Cobb