Computer Security Handbook
Computer Security Handbook – Online Resources
Computer security is a wide subject matter that is continuously progressing each day. One should be cautious of all the possible threats as there are many dangers overlooked. Said threats include hacking, identity theft, and a breach of security of one's personal information. The list of computer security resources provided below can be found on the Internet and has been arranged by topic for your convenience.
General Security Tips
- The University of Utah: Basic Computer Safety
- Maryville University: Computer and Internet Safety Tips
- Massachusetts Institute of Technology: Secure Computing
- FTC: Computer Security
- DHS: Challenge Yourself to Do More to Stay Safe Online
- North Carolina Department of Public Safety: Internet and Computer Safety
- Information Security Awareness Videos (Videos)
- Consumer Reports: Guide to Digital Security & Privacy
Password Security
- The State of Alabama Office of Information Technology, Cybersecurity Division: Password Security
- US-CERT: Choosing and Protecting Passwords
- Phys.org: Teenage Password Security
- The Ohio State University: Passwords, Security, Attacks
- NPR.org: Hunting For A Password That Only Your Will Know
Identity Theft
- ID Theft Center: Identity Theft Resource Center
- Federal Trade Commission: Guide for Assisting Identity Theft Victims (PDF)
- ID Theft Info: ID Theft Statistics and Studies
- NY Police Department: Identity Theft Prevention (PDF)
- ID Theft Resolutions: ID Theft Victim Assistance
- Identity Theft Protection: LifeLock with Norton 360
Anti-Phishing
- Indiana University: Phishing Education & Training
- US-CERT: Report Phishing Sites
- Princeton University: What is Phishing and What You Can Do About it
- Penn State Office of Information Security: Phishing Tips
- Marquette University: Anti-Phishing Campaign
- FTC: How to Recognize and Avoid Phishing Scams
Anti-Spam
- Campbell University: Email Anti-Spam / Anti-Virus Tips
- Cornell Law School: U.S. State Anti-Spam Laws
- University of Washington IT: Protecting your email - Fighting viruses and spam
- Federal Communications Commission: Stop Unwanted Robocalls and Texts
- StaySafeOnline.org: Spam & Phishing
- US-CERT: Reducing Spam
Malicious Software (Malware) Information
- Federal Trade Commission: How To Recognize, Remove, and Avoid Malware
- Cisco Security: What Is the Difference: Viruses, Worms, Trojans, and Bots?
- University of Massachusetts Amherst: Malware: Viruses, Spyware, Adware & Other Malicious Software
- University of Nevada, Las Vegas: Malicious Software
- California State University: Malicious Software on Websites
- Michigan Department of Attorney General: Malware - What Is It and How To Avoid It
- University of Rochester: Malware
Social Networking Security
- University of Pittsburgh, Information Technology: Best Practices: Safe Social Networking
- International Journal of Advanced Computer Science and Applications: Role of Security in Social Networking
- Privacy Rights Clearing House: Societal Perspectives on the Role of Privacy in Social Networking Sites
- King University Online: The Emerging Need for Social Media Security
- East Coast Polytechnic Institute™: Cyber Security for Social Media: What Information Is at Stake?
- FBI: Social Media and the Use of Personal Information
Firewall Information
- US-CERT: Understanding Firewalls for Home and Small Office Use
- Tony Northrup: Firewalls
- Indiana University: About Firewalls
- Massachusetts Institute of Technology: The Three Myths of Firewalls
- FreeBSD, by Joseph J. Barbish, updated by Brad Davis: Network Communication - Firewalls
- Cisco Systems: Types of Firewalls