Chapter 25. Understanding IT Security
Information Technology (IT) security includes multiple elements all designed to minimize losses. Digital security methods ensure that users are uniquely identified and authenticated before they are granted permission to access resources. Valuable data can be further protected with encryption. When disposing of media at the end of its life cycle, secure methods are used to erase the data. When necessary, the media is destroyed.
Exam 220-802 objectives in this chapter:
1.4 Given a scenario, use appropriate operating system features and tools.
Administrative
Users and groups
Local security policy
1.5 Given a scenario, use Control Panel utilities (the items are organized by “classic view/large icons” in Windows).
Common ...
Get CompTIA® A+® Training Kit (Exam 220-801 and Exam 220-802) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.