{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

ch19 - Chapter19 SecurityEssentials protectres

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 19 Security Essentials
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Learn why it is important to comply with  established security policies Learn ways to authenticate and classify users so  that you can control who has access to your  resources and what users can do with them Learn about additional methods you can use to  protect resources Learn how to monitor and maintain the security  measures you have implemented A+ Guide to Managing and Maintaining Your PC, 7e 2
Background image of page 2
Factors influencing implementation Free to decide, legal requirements, value added Security standards International Organization for Standardization  National Institute of Standards and Technology Health Insurance Portability and Accountability Act Security goals Protect resources Avoid interference with system functions A+ Guide to Managing and Maintaining Your PC, 7e 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Security plan implementation Plan-Do-Study-Act (PDSA) A+ Guide to Managing and Maintaining Your PC, 7e 4 Figure 19-2 A four-step plan to develop a system for an organization. Courtesy: Course Technology/Cengage Learning
Background image of page 4
Controlling access in Windows Authentication Proves that an individual is who he says he is Authorization Determines what an individual can do in the system after  authentication Physical security in place is also required A+ Guide to Managing and Maintaining Your PC, 7e 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Local computer and network users BIOS settings control computer access Local user account login to Windows Large networks Domain controllers manage network authentication Most common authentication method Password Other methods Biometric data smart cards A+ Guide to Managing and Maintaining Your PC, 7e 6
Background image of page 6
Authenticate users in Windows Control access with account password Provides ability to change password at any time Control log on methods User clicks name and enters password from Welcome  screen (malware can intercept) User presses Ctrl+Alt+Del to get to logon window (more  secure method) A+ Guide to Managing and Maintaining Your PC, 7e 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Updating Windows Vista  to use Ctrl+Alt+Del logon Enter netplwiz in Start  Search box, press Enter Respond to UAC box: User  Accounts box appears Click Advanced tab, check  Require users to press  Ctrl+Alt+Delete, click Apply  and close box A+ Guide to Managing and Maintaining Your PC, 7e 8 Figure 19-4 Change the way users log onto Vista. Courtesy: Course Technology/Cengage Learning
Background image of page 8
Updating Windows XP to use Ctrl+Alt+Del logon Open Control Panel, open User Accounts applet Click Change the way users log on or off User Accounts window opens Make appropriate changes A+ Guide to Managing and Maintaining Your PC, 7e 9 Figure 19-5
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 59

ch19 - Chapter19 SecurityEssentials protectres

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online