Chapter 1: Computer Security: 20 Things Every Employee Should
Know
Chapter 2: Beware of phishing and spyware
Chapter 3: Protect your identity
Chapter 4: Be responsible and be aware
Chapter 5: Choose your password wisely
Chapter 6: Practice safe access
Chapter 7: Protect your work outside the office
Chapter 8: Reduce e-mail risks
Chapter 9: Suspect e-mail hoaxes
Chapter 10: Work wisely with the Web
Chapter 11: Avoid Internet dangers
Chapter 12: Master instant messaging
Chapter 13: Use firewalls and patches
Chapter 14: Use PDAs safely
Chapter 15: Back up and secure data
Chapter 16: Manage data wisely
Chapter 17: Secure your workspace
Chapter 18: Beware of social engineers
Chapter 19: Use corporate resources only for work
Chapter 20: Call the experts when things go wrong
Chapter 21: Keep things in context
Appendix: Glossary of computer security Terms
About the author
Biography of Ben Rothke Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences. While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.
![]() |
Ask a Question About this Product More... |
![]() |