|| Now available online as an Acrobat PDF
This chapter is about: How to become and remain secure
...the chapter discusses some of the key issues raised by previous chapters
and contemplates future directions in personal computer and local area network
security. Some conclusions will be drawn, advice will be offered, and some
dissenting opinions will be aired. We will also look back at developments over
the last five years to see if they offer any clues for the next five.
If you arrived at this chapter after reading the preceding fourteen, well done!
Your reward is a chance to step back and think about the "big picture." If you
turned straight to this chapter, perhaps to get the bottomline on personal
computer and local area network security, shame on you! But seriously, this
chapter assumes that you are conversant with the concepts and technologies of
computer security, as they apply at the desktop level. There is no short cut
to comprehensive computer security.
The Story So Far
- No typos or errors reported so far.
- Links and supplemental info being prepared.
- Check back in 10 days for more links and info.
Table of Contents with Links to Chapters
[Top of Page] [PC LAN Security Home Page] [Table of Contents]
- Chapter 1. Security Matters: Assessing the problems, threats, and issues
- Chapter 2. Security Solutions: Basic concepts and techniques
- Chapter 3. Security Planning: Risk analysis and security policy
- Chapter 4. Secure Hardware: Defending and insuring equipment
- Chapter 5. Secure Power: Spikes, Sparks, and Electrical Threats
- Chapter 6. Secure Sites: Defending sites and systems
- Chapter 7. Secure Access: Controls, passwords, and encryption
- Chapter 8. Secure Data: Backup, backup, backup
- Chapter 9. Secure Code: Defeating viruses, worms and other malicious code
- Chapter 10. Secure Software: Piracy, bugs, and other "soft" threats
- Chapter 11. Secure Networks I: Generic network defense
- Chapter 12. Secure Networks II: Protecting name brand networks
- Chapter 13. Secure Communications: WANs, remote access, and the Internet
- Chapter 14. Secure People: Hacking and ethical issues
- Chapter 15. Security in the Future: How to become and remain secure
- Appendix A: Threat List
- Appendix B: A Brief Guide to Batch Files
- Appendix C: Computer Security Policy
- Appendix D: Notes on EMR
- Appendix E: Export Restrictions on Encryption
- Appendix F: Further Resources
- Appendix G: Glossary
- Appendix H: How Public Key Encryption Works
- Appendix I: Introduction to LANs
- Appendix J: Securing Safe Software
- Appendix K: Appraising Microsoft AV
This page updated by Stephen Cobb, Summer 2002 © Copyright, 1996-2002, Stephen Cobb