Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
In this document I will discuss some issues related to security on network and how design a secure network. We will look to network segmentations and how it will help us to identify the network topology.
There has been much debate lately between two different browsers, namely Microsoft's Internet Explorer and the Mozilla Project's Firefox web browser. Security is in the center of this debate, accompanied by features and usability.
This paper will emphasize free software alternatives to combat viruses/Trojans, protect against spyware, provide safe Internet browsing, prevent computer intrusions, and eliminate pop-ups. The software will all be for the Windows OS platform, concentrating on users with Windows XP SP1 and SP2. Each category will discuss the inherit risks and include a few pieces of free software that can help mitigate risks.
As the Internet community becomes more skilled in their use of attack tools, we are seeing an increase in the number and severity of Internet attacks. Internet neophytes and professionals alike are asking the same question "There are hundreds of thousands of computers on the Internet, why was my computer attacked?"
In this paper the author explores one layer of a multi-layered defense of the internal network of a SOHO user, and how to configure the packet filtering capability of a cable or digital subscriber line (DSL) router for a mixed OS network. This paper is an extension of the work of Rick Thompson  and Patrick Harris 
By: Sushilkumar Nahar (posted on October 31, 2003)
This paper addresses combining broadband access technologies with integrated security solutions, so enterprises and service providers can safely and securely capitalize on all of the benefits of the broadband Internet.
My goal of this paper is to provide an understanding of today's Internet Service Providers (ISP) offerings and methods in which you can secure your home Microsoft windows networking environment as effective as possible.
This paper demonstrates why consumer desktops are particularly vulnerable to compromise, what options are available today to protect the consumer desktop and why Internet Service Providers (ISP's) are particularly well positioned to improve the security of consumer desktops.
This paper's purpose is to make the home computer user aware of the risks of using an unsecured computer, and to provide a guide in how to secure the home computer by applying various layers of defense to their system.