Computer and Other
Technical Vulnerabilities
Computer Vulnerabilities
Threats to computer
security, how hackers work, and how we unintentionally make it easy for them. Passwords, "social
engineering," case studies, using the Internet securely, e-mail,
viruses, security of hard drives, theft of laptop computers.
Intercepting Your
Communications
Telephones, fax
machines, cell phones, cordless phones, answering machines, voice mail,
intercoms and baby monitors, countermeasures.
Bugs
and Other Eavesdropping Devices
Eavesdropping
threat. Methods of eavesdropping. Detecting and Preventing
Eavesdropping.
|