Summary

This chapter introduced you to the concept of hardening operating systems and applications. To secure a network, each of the elements in its environment must be individually evaluated. Remember, your network is no more secure than its weakest link.

The process of making a server or an application resistant to attack is called hardening. One of the major methods of hardening an operating system is to disable any protocols that aren’t needed in the system. Keeping systems updated also helps improve security.

The FAT filesystem provides user-level and share-level security. As a result, FAT is largely unsuitable as a filesystem for use in secure environments. NTFS provides security capabilities similar to Unix, and it allows control of individual ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.