Browse Prior Art Database

Users' Security Handbook (RFC2504)

IP.com Disclosure Number: IPCOM000003087D
Original Publication Date: 1999-Feb-01
Included in the Prior Art Database: 2000-Sep-13
Document File: 27 page(s) / 69K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

. Guttman: AUTHOR [+3]

Abstract

The Users' Security Handbook is the companion to the Site Security Handbook (SSH). It is intended to provide users with the information they need to help keep their networks and systems secure.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 4% of the total text.

Network Working Group E. Guttman

Request for Comments: 2504 Sun Microsystems

FYI: 34 L. Leong

Category: Informational COLT Internet

G. Malkin

Bay Networks

February 1999

Users' Security Handbook

Status of this Memo

This memo provides information for the Internet community. It does

not specify an Internet standard of any kind. Distribution of this

memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1999). All Rights Reserved.

Abstract

The Users' Security Handbook is the companion to the Site Security

Handbook (SSH). It is intended to provide users with the information

they need to help keep their networks and systems secure.

Table of Contents

Part One: Introduction . . . . . . . . . . . . . . . . . . . . 2

1. READ.ME . . . . . . . . . . . . . . . . . . . . . . . . . 2

2. The Wires have Ears . . . . . . . . . . . . . . . . . . . 3

Part Two: End-users in a centrally-administered network . . . 4

3. Watch Out! . . . . . . . . . . . . . . . . . . . . . . . 4

3.1. The Dangers of Downloading . . . . . . . . . . . . . . 4

3.2. Don't Get Caught in the Web . . . . . . . . . . . . . . 5

3.3. Email Pitfalls . . . . . . . . . . . . . . . . . . . . 6

3.4. Passwords . . . . . . . . . . . . . . . . . . . . . . . 7

3.5. Viruses and Other Illnesses . . . . . . . . . . . . . . 7

3.6. Modems . . . . . . . . . . . . . . . . . . . . . . . . 8

3.7. Don't Leave Me... . . . . . . . . . . . . . . . . . . . 9

3.8. File Protections . . . . . . . . . . . . . . . . . . . 9

3.9. Encrypt Everything . . . . . . . . . . . . . . . . . . 10

3.10. Shred Everything Else . . . . . . . . . . . . . . . . . 10

3.11. What Program is This, Anyway? . . . . . . . . . . . . . 11

4. Paranoia is Good . . . . . . . . . . . . . . . . . . . . 11

Part Three: End-users self administering a networked computer 14

5. Make Your Own Security Policy . . . . . . . . . . . . . . 14

6. Bad Things Happen . . . . . . . . . . . . . . . . . . . . 15

6.1. How to Prepare for the Worst in Advance . . . . . . . . 15

6.2. What To Do if You Suspect Trouble . . . . . . . . . . . 16

6.3. Email . . . . . . . . . . . . . . . . . . . . . . . . . 17

7. Home Alone . . . . . . . . . . . . . . . . . . . . . . . 17...