Chapter 25. Understanding IT Security
Information Technology (IT) security includes multiple elements all designed to minimize losses. Digital security methods ensure that users are uniquely identified and authenticated before they are granted permission to access resources. Valuable data can be further protected with encryption. When disposing of media at the end of its life cycle, secure methods are used to erase the data. When necessary, the media is destroyed.
Exam 220-802 objectives in this chapter:
1.4 Given a scenario, use appropriate operating system features and tools.
Users and groups
Local security policy
1.5 Given a scenario, use Control Panel utilities (the items are organized by “classic view/large icons” in Windows).