CHAPTER 12

Implement Configuration Changes to Existing Controls to Improve Security

In this chapter you will learn:

•   How to manage access with user and group policies

•   How to control execution of applications with whitelisting and blacklisting

•   Various methods of network and application filtering

•   How to read and write common intrusion detection rules

The world is full of obvious things which nobody by any chance ever observes.

—Sir Arthur Conan Doyle

Information systems are composed of increasingly complex components designed to meet a variety of business needs. Maintaining a high level of security requires careful thought about how the network is architected, configured, and deployed. Understanding that the environment is in ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.