Good Hygiene for Data and Personal ComputersDiplo Foundation, 2003 - 39 pagine |
Sommario
Setting the scene for information insecurity | 5 |
Building effective personal defences | 21 |
Conclusion | 39 |
Parole e frasi comuni
advertisements anti-virus software attack available free Bad idea Belarc Advisor Blocked Zone booklet browser CD-ROM Click COMPUTER CRIME computer users computer virus configuration connected credit card numbers cybercrime deleted Dell Computer Corporation digital signature DiploFoundation diplomacy discussed in section e-mail package Eduardo Gelbstein electronic employee encryption mechanisms example Firewall protection folder free of charge hackers hard disk help desk hijacking http://www.zdnet.com incremental backup individuals information security information technology install Internet Explorer Internet Zone involved Jovan Kurbalija junk mail laptop malicious code malicious software manage cookies megahertz Netscape Norton SystemWorks operating systems Options organisation’s Organised crime password PDAs personal computers personal firewalls personal information Privacy problem scam Scan spammers spyware Stefano Baldi surf Technical pests Temporary Internet files theft tions Trojan Horse Trusted Zone United Nations updates utilities vendors versions victims Virus wasters Windows worm ZDnet website Zone Security