Is your computer secure?
Facebook etiquette & privacy for dummies
[Hoboken, N.J.] : Wiley, 2009.
Face it-you need this book-and-DVD bundle covering the biggest issues Facebook users need to know Facebook For Dummies tops the charts with each successive edition published, and this latest edition is expected to continue that trend. Packed with critical issues that have heavily affected Facebook users, this new version includes a full version of Facebook For Dummies, 3rd Edition and the 60-minute DVD Facebook Etiquette & Privacy For Dummies . Facebook experts Leah Pearlman and Carolyn Abram address critical issues such as how to decipher between a legitimate message from a friend and a possible virus. You'll learn how to implement privacy settings to limit access to your status updates and photos, handle friend requests from people you don't know, determine how many friends you should have on your profile, and create a friend list to make sure only certain people see certain content. Plus, you'll discover the many recent privacy and interface changes and learn how to manage these issues so that you can enjoy Facebook to its fullest. Features the full edition of Facebook For Dummies, 3rd Edition and a 60-minute DVD that discusses privacy and etiquette issues Covers the most essential issues that Facebook users need to know Explains how to set privacy to limit access to information to only the people you want to see your Facebook content Details ways to handle friend requests from people you don't know or distinguish between a legitimate message or a virus disguised as one Walks you through implementing privacy settings to limit access to your status updates and photos Don't just accept any old Facebook advice on face value-this book-and-DVD bundle contains everything you need to know to make the most of your Facebook experience!
Internet safety
edited by Richard Joseph Stein.
New York : H.W. Wilson Company, 2009.
  1. Reprints of previously published magazine and newspaper articles.
  2. Includes bibliographical references (p. [163]-173) and index.
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
Julie E. Mehan.
Ely : IT Governance, 2008.
Includes bibliographical references and index.
The future of the Internet and how to stop it
Jonathan Zittrain.
New Haven [Conn.] : Yale University Press, c2008.
"This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity - and reveals that it is in danger precisely because of its runaway success. With the unwitting help of its users, the Internet and PC are on a path to a lockdown, ending their cycles of innovation - and facilitating unsettling new kinds of control." "iPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can't be easily modified by anyone except their vendors or selected partners. These "tethered appliances" have already been used in remarkable but little known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted - but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the nature of the Internet - its "generativity" that permits anyone, anywhere to build on it - is at risk." "The Internet's current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the goodwill of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, Zittrain shows how to develop new technologies and social structures that allow users to work creatively and collaboratively while avoiding the excesses and abuses of openness - and to preserve the promise of the Net."--BOOK JACKET.
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions
David Pollino ... [et al.].
New York : McGraw-Hill, c2006.
Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident-how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident. Book jacket.
Protect your child on theInternet : a parent's toolkit
John Lenardon.
Bellingham, Wash. Self-Counsel Press, 2006.
The Internet is a fun and exciting place for people of all ages. However, it can also be a dangerous place for children. Protect Your Child on the Internet explains what those dangers are and how you can protect your child.

Computer security protects your computer and everything that is associated with it. This includes your building, personal computers, printers, cabling, diskettes, and computer chips.

Perhaps more importantly, computer security includes methods that protect the information you have stored on your computer system. Often computer security is called information security.

Secrecy and confidentiality are both of great importance in protecting information systems. A secure computer system will not allow information to be disclosed to anyone who is not authorized to access it. Knowledge is power. So, especially in the business world, you want to take precautions to be sure your competitors do not have knowledge of your day-to-day business activities.

Three keywords are used to discuss computer security:

  • Vulnerabilities
  • Threat
  • Countermeasure

Vulnerabilities are points where a computer system is susceptible to an attack. 

A threat is a possible danger to the system, such as a spy or computer hackers. 

Techniques used to protect your computer and the information stored on it are called countermeasures. These countermeasures help stop computer hackers from destroying or stealing your information. 

Strong passwords

Have at least eight characters

Include numbers and symbols

Are changed every 90 days

(from Microsoft)

An individualized password, a secret word that onlly you know is one of the strongest ways to protect your computer.  Installing viruse detection and spyware software on your computer provides additional protection. 

The Computer Security Act of 1987 (PL100-235) enabled the Federal Government to oversee Federal Government computers. The National Institute of Standards and Technology (NIST) gets computer safety, security, and privacy responsibilities through standards and guidelines. There is the High-Performance Computing Act of 1991 (PL 102-194) that gives NIST this authority. Finally, starting in 1991 the Federal Information Processing Standards Publications (FIPS) was initiated by NIST.

Take action now to keep your computer system and the information on it secure.

Article by: St. Louis Public Library staff