Chapter 25. Understanding IT Security

Information Technology (IT) security includes multiple elements all designed to minimize losses. Digital security methods ensure that users are uniquely identified and authenticated before they are granted permission to access resources. Valuable data can be further protected with encryption. When disposing of media at the end of its life cycle, secure methods are used to erase the data. When necessary, the media is destroyed.

Exam 220-802 objectives in this chapter:

  • 1.4 Given a scenario, use appropriate operating system features and tools.

    • Administrative

      • Users and groups

      • Local security policy

  • 1.5 Given a scenario, use Control Panel utilities (the items are organized by “classic view/large icons” in Windows).

    • Common ...

Get CompTIA® A+® Training Kit (Exam 220-801 and Exam 220-802) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.