Information Security for the Layperson

Contributed by Dietrich Lehr

I will be covering a multitude of network and personal security measures that can be implemented in order to provide a person or other entity with the means to secure their desired data. I will explain how the practice works and its intended benefit as well as potential limitations that it may impose. Areas of examination will include general network security configuration, network and application security tools, user anonymity tools to keep personally identifiable information private, and some user practices that can reduce exposure or data compromise to unintended parties. The overall intent is to explain measures that can be taken to increase security.

This document is in PDF format. To view it click here.

Rate this article: 
Average: 5 (3 votes)