Chapter 12. Security

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

Image What are some types of security threats that involve malicious software?

Image What are some types of security threats that involve Internet Security software?

Image What are some types of security threats that involve access to data and equipment?

What are some types of security procedures?

What are the elements of a strong security policy? ...

Get IT Essentials Companion Guide v6, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.