The Essentials and Beyond

This chapter introduced many of the basics related to IT security. Risk occurs when a threat has the potential to exploit a vulnerability, and risk mitigation reduces risks by reducing vulnerabilities. The security triad mandates the protection against loss of confidentiality, loss of integrity, and loss of availability of systems and data. A primary principle to protect against these losses is a defense-in-depth strategy, which includes multiple layers of security. Defense-in-depth increases the difficulty of exploiting systems and ensures that security remains in place even if one layer fails. The principle of least privilege states that users, resources, and applications are granted rights and permissions needed to ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.