• Computer security
    1. What is computer security?
    2. Why should I care about computer security?
    3. Who would want to break into my computer at home?
    4. How easy is it to break into my computer?
  • Technology
    1. What does "broadband" mean?
    2. What is cable modem access?
    3. What is DSL access?
    4. How are broadband services different from traditional dial-up services?
    5. How is broadband access different from the network I use at work?
    6. What is a protocol?
    7. What is IP?
    8. What is an IP address?
    9. What are static and dynamic addressing?
    10. What is NAT?
    11. What are TCP and UDP ports?
    12. What is a firewall?
    13. What does antivirus software do?
  • Computer security risks to home users
    1. What is at risk?
    2. Intentional misuse of your computer
      1. Trojan horse programs
      2. Back door and remote administration programs
      3. Denial of service
      4. Being an intermediary for another attack
      5. Unprotected Windows shares
      6. Mobile code (Java, JavaScript, and ActiveX)
      7. Cross-site scripting
      8. Email spoofing
      9. Email-borne viruses
      10. Hidden file extensions
      11. Chat clients
      12. Packet sniffing
    3. Accidents and other risks
      1. Disk failure
      2. Power failure and surges
      3. Physical theft
  • Actions home users can take to protect their computer systems
    1. Consult your system support personnel if you work from home
    2. Use virus protection software
    3. Use a firewall
    4. Donít open unknown email attachments
    5. Donít run programs of unknown origin
    6. Disable hidden filename extensions
    7. Keep all applications (including your operating system) patched
    8. Turn off your computer or disconnect from the network when not in use
    9. Disable Java, JavaScript, and ActiveX if possible
    10. Disable scripting features in email programs
    11. Make regular backups of critical data
    12. Make a boot disk in case your computer is damaged or compromised

    Appendix: References and additional information

    T O P