Professional Documents
Culture Documents
3
Index
1.1 INTRODUCTION .......................................................................................................................................... 8
4
1.4.17 DENIAL OF SERVICE ATTACK.......................................................................................................................... 24
1.4.18 SALAMI ATTACK ......................................................................................................................................... 24
1.4.19 DATA DIDDLING ......................................................................................................................................... 25
1.4.20 EMAIL SPOOFING........................................................................................................................................ 25
2.2 ENCRYPTION............................................................................................................................................. 27
5
7.2.3.1 How to Access the Windows Firewall with Advanced Security ........................................................ 83
7.2.3.2 What Are The Inbound & Outbound Rules? ..................................................................................... 84
7.2.3.3 What Are The Connection Security Rules? ....................................................................................... 86
7.2.3.4 What Does the Windows Firewall with Advanced Security Monitor? ............................................. 87
8.1 FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT ............................................... 89
11.1 SAFE BROWSING GUIDELINES FOR SOCIAL NETWORKING SITES ........................................................... 123
6
11.2 EMAIL SECURITY TIPS ........................................................................................................................... 128