{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

chap26 - All-In-One CompTIA Network All-in-One Exam Guide...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAPTER 26 1153 Securing Computers In this chapter, you will learn how to • Explain the threats to your computers and data • Describe key security concepts and technologies • Explain how to protect computers from network threats Your PC is under siege. Through your PC, a malicious person can gain valuable infor- mation about you and your habits. He can steal your files. He can run programs that log your keystrokes and thus gain account names and passwords, credit card information, and more. He can run software that takes over much of your computer processing time and use it to send spam or steal from others. The threat is real and right now. Worse, he’s doing one or more of these things to your clients as I write these words. You need to secure your computer and your users from these attacks. But what does computer security mean? Is it an antivirus program? Is it big, complex passwords? Sure, it’s both of these things, but what about the fact that your laptop can be stolen easily? To secure computers, you need both a sound strategy and proper tactics. From a strategic sense, you need to understand the threat from unauthorized access to local machines as well as the big threats posed when computers go onto networks. Part of the big picture means to know what policies, software, and hardware to put in place to stop those threats. From a tactical in-the-trenches sense, you need to master the details, to know how to implement and maintain the proper tools. Not only do you need to install antivirus programs in your users’ computers, for example, but you also need to update those programs regularly to keep up with the constant barrage of new viruses. Analyzing Threats Threats to your data and PC come from two directions: accidents and malicious people. All sorts of things can go wrong with your computer, from users getting access to folders they shouldn’t see to a virus striking and deleting folders. Files can be deleted, renamed, or simply lost. Hard drives can die, and optical discs get scratched and rendered unread- able. Accidents happen and even well-meaning people can make mistakes.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
CompTIA A+Certification All-in-One Exam Guide 1154 Unfortunately, a lot of people out there intend to do you harm. Add that intent together with a talent for computers, and you have a deadly combination. Let’s look at the following issues: Unauthorized access Data destruction, accidental or deliberate Administrative access Catastrophic hardware failures Viruses/spyware Historical/Conceptual Unauthorized Access Unauthorized access occurs when a person accesses resources without permission. Re- sources in this case mean data, applications, and hardware. A user can alter or delete data; access sensitive information, such as financial data, personnel files, or e-mail mes- sages; or use a computer for purposes the owner did not intend.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}