Chapter 2: Implementing Security
Exam Objectives
Securing systems through BIOS
Implementing users and groups
Implementing permissions and rights
Implementing auditing
Implementing firewalls
Implementing security best practices
In this chapter, you find out how to implement security best practices on systems at home or at the workplace. The preceding chapter introduces terms such as authentication and authorization; this chapter demonstrates how to perform such tasks. You find out how to create a user account that can be used for authentication and how to authorize the user to access a folder or perform an action within the operating system. This chapter will ensure that you know how to perform basic security-related tasks!
When thinking about network security, understand that security is to be implemented at multiple layers, meaning that you cannot focus on just one security-related ...