Home Network Security Simplified

Jim Doherty, Neil Anderson

  • 出版商: Cisco Press
  • 出版日期: 2006-06-01
  • 售價: $1,130
  • 貴賓價: 9.5$1,074
  • 語言: 英文
  • 頁數: 224
  • 裝訂: Paperback
  • ISBN: 1587201631
  • ISBN-13: 9781587201639
  • 相關分類: 資訊安全
  • 已絕版
    無現貨庫存(No stock available)



A straightforward, graphic-based reference for securing your home network 

  • Set up a firewall
  • Secure your wireless network
  • Stop adware and spyware
  • Keep your children safe from online threats
  • Prevent a virus outbreak
  • Avoid Internet scams 

Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your vulnerability–is that much greater. Now, with Home Network Security Simplified, you can get illustrated, easy-to-digest information written specifically for your needs.


For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to:

Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. Use this book to find the peace of mind that comes with knowing that your home network and your information are secure.


Jim Doherty is the director of marketing and programs with Symbol Technologies’ industry solutions group. Prior to joining Symbol, Jim worked at Cisco Systems, where he led various marketing campaigns for IP telephony and routing and switching solutions. Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies. Jim is a coauthor of the Networking Simplified series, including Cisco Networking Simplified, Home Networking Simplified, and Internet Phone Services Simplified. He is also the author of the “Study Notes” section of CCNA Flash Cards and Exam Practice Pack (CCNA Self-Study, Exam #640-801), Second Edition. Jim is a former Marine Corps sergeant; he holds a bachelor’s degree in electrical engineering from N.C. State University and a master’s degree in business administration from Duke University.


Neil Anderson is the senior manager of enterprise systems engineering at Cisco Systems. Neil has more than 20 years of engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is a coauthor of the Networking Simplified series, including Home Networking Simplified and Internet Phone Services Simplified. Neil holds a bachelor’s degree in computer science.


This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.




Table of Contents



Chapter 1        Tip 1: Use Firewalls

Why Do I Need Firewalls?

How Firewalls Work

Stateful Packet Inspection Firewalls  

Personal Software Firewalls  

Putting Firewalls to Work  

Putting a Firewall Between You and the Internet   

Enabling Personal Firewalls on Your Computers  

Test Driving Your New Protection  

What to Do If You Think You’ve Been Hacked  

Sometimes, Firewalls Block the Good Stuff  


Where to Go for More Information  


Chapter 2        Tip 2: Secure Your Wireless Network  

Why Should I Care About Wireless Network Security?  

What Do I Do About Wireless Security?  

Change Your Password  

Do Not Advertise Your Wireless Network  

Scramble Your Signal  

Disable Ad-Hoc Networking  

How to Do It: Securing Your Wireless Network  

Change the Router’s Default Password  

Stop Advertising Your Wireless Network  

Enable Wireless Encryption  

Disable Ad-Hoc Networking  

Prevent Unintentional Roaming  

Wireless Security Checklist  


Where to Go for More Information  


Chapter 3        Tip 3: Use Antivirus Protection  

What Are Computer Viruses?  



Trojan Horses  

Commonsense Approach to Computer Viruses  

How Antivirus Works  

Virus Detection  

Virus Prevention  

Inoculating Yourself Against Computer Viruses  

Turning On Antivirus at Your ISP   

Installing Antivirus Software on Your Computers  

Windows Live OneCare  

What to Do If You Think You’ve Been Infected  


Where to Go for More Information  


Chapter 4        Tip 4: Keep Your Software Updated  

Why Software Needs to Be Updated  

Updating Your Operating System  

Enabling Automatic Updates  

Manual Operating System Updates  

Updating Your Software Programs  

Using Windows Restore Points  

Creating a Restore Point   

Restoring Your Computer to a Restore Point   

What to Do If You Think Your Operating System Has Been Compromised  


Where to Go for More Information  


Chapter 5        Tip 5: Lock Out Spyware and Adware  

What Is Spyware and Adware?  



Are Spyware and Adware Viruses?  

Preventing Spyware and Adware  

Exercising Common Sense  

Installing a Popup Blocker  

Installing an Antispyware/Antiadware Program  

What to Do If You Think You’ve Been Infected  

Spyware/Adware-Removal Tools  

Removing Spyware and Adware Programs Using the Installed Programs List  


Where to Go for More Information  


Chapter 6     Tip 6: Keep an Eye on Your Kids  

What Are the Dangers Your Kids Might Encounter Online?  





Illegal Peer-to-Peer Sharing  

Maybe I Should Rethink This Internet Thing  

Preparing Kids for Being Online  

Establish and Communicate the Internet Usage Policy  

Making Kids Aware of Online Dangers  

Avoid Giving Out Personal Information Online  

Policing Kids Online  

Browse in Plain Sight  

Monitor and Review Your Kids’ Websites and Blogs  

Check Out Your Kids’ Blogs  

Review Website History  

Using Parental Controls  

Parental Controls at Your ISP  

Parental Controls at Your Home Network Router  

Parental Controls on Your Computers  

What to Do If You Think Your Child Is Abusing the Rules  

Activity Loggers  


Where to Go for More Information  


Chapter 7     Tip 7: Recognize and Avoid Phishing Scams  

How Phishing Scams Work   

Tricks of the Trade  

How to Avoid Becoming a Victim  

What to Do If You Suspect You Are the Target of a Phishing Scam  


Where to Go for More Information  


Chapter 8     Tip 8: Create Strong Passwords  

Anatomy of a Lousy Password  

Elements of a Strong Password  

How to Create a Strong Password That You Can Remember  

Additional Password Tips  


Where to Go for More Information  


Chapter 9     Tip 9: Back Up Your Files  

What Should I Back Up?  

Where Do I Back Up To?  

How Often Should I Back Up?  

Storage Method Overview  

Flash Memory   

External Hard Drives   

Networked Storage  

Online Storage  

DVD or CD Storage  

Summary of Storage Options  

Putting It All Together  

Using Windows XP Backup  


Where to Go for More Information  


Chapter 10   Tip 10: Use Common Sense  

Urban Legends   

E-Mail Stock Tips (Pump-and-Dump Scams)  

Work from Home (Pyramid) Schemes  

Money-Exchange Schemes  

“Hot” Merchandise Scam  

What to Do to Protect Yourself  


Where to Go for More Information  


Chapter 11   ”They Couldn’t Hit an Elephant at This Distance”