Table of Contents

  1. Introduction
  2. Privacy Intrusions
    1. Intrusion Methods
    2. Intrusion Activity
    3. Malware
    4. Malware Activity
    5. Web Advertising
    6. Privacy Intrusion Activity
  3. Security Fundamentals
    1. Authentication
    2. Password Authentication
    3. User Authentication
    4. Biometrics Activity
    5. Digital Authentication
    6. Access Control
    7. Introducing Firewalls
    8. Encryption
    9. Cryptography Activity
    10. Symmetric Encryption
    11. Enigma Activity
    12. Asymmetric Encryption
    13. Auditing
    14. Auditing Activity
  4. Summary
  5. SAQ 1
    1. SAQ 2
    2. SAQ 3