Reprinted from TidBITS by permission; reuse governed by Creative Commons license BY-NC-ND 3.0. TidBITS has offered years of thoughtful commentary on Apple and Internet topics. For free email subscriptions and access to the entire TidBITS archive, visit http://www.tidbits.com/ Take Control of Security for Mac Users, Chapter 6: Improve Your Network Security Joe Kissell This article is a pre-release chapter in the upcoming 'Take Control of Security for Mac users,' by Joe Kissell, scheduled for public release later in 2015. Apart from [1]Chapter 1: Introducing Mac Security, and [2]Chapter 2: Learn Security Basics, these chapters are available only to [3]TidBITS members; see [4]'Take Control of Security for Mac Users' Streaming in TidBITS for details. __________________________________________________________________ Chapter 6: Improve Your Network Security Macs usually connect to the outside world using Wi-Fi or Ethernet. ('Outside world' might mean another Mac across the room or a server on the other side of the planet.) In fact, most of us have become so dependent on network access that we find it hard to get any work done if that all-important Internet connection goes down. That dependence on interacting with other devices is both a strength and a weakness. It gives us access to massive power and instantaneous global communication'but it also gives the bad guys an attractive target. This chapter discusses the reasons for protecting your network connection and how to go about doing so. What You're Trying to Protect Against Broadly speaking, the point of network security'or at least, the particular subset of network security I cover in this chapter'is to protect data as it flows to and from your Mac over both local networks and the Internet. (In Chapter 7, Fortify Your Mac's Defenses, I talk about another aspect of network security'protecting your Mac itself from intrusions and damaged caused by network-based attacks.) But what sort of threats might your network communication face, and from whom? The rest of this 2,540-word article is currently restricted to paid TidBITS members. If you'd like to support our work and [5]become a paid member, it's an easy process and we'll throw in some additional perks. If you are a paid TidBITS member, you can read the rest of this article by logging into your account. Clicking My Account > Login at the left. [6]Contact us if you have problems. References 1. http://tidbits.com/article/15376 2. http://tidbits.com/article/15377 3. http://tidbits.com/member_benefits.html 4. http://tidbits.com/article/15375 5. file://localhost/member_benefits.html 6. mailto:ace@tidbits.com .