Local Computer Security Threats and Best Practices

In this chapter, you will learn how to

•  Explain the threats to local PC security

•  Describe physical access control and device hardening

•  Select appropriate user account types

These days, you can’t afford to be blissfully unaware when it comes to computer security. Threats to your security, privacy, and computer lurk around every corner. Through your devices, a malicious person (an attacker) can gain valuable information about you and your habits. An attacker can steal your files or run programs that log your keystrokes to pilfer account names and passwords, credit card information, and more. An attacker could even run software that takes over your computer to send spam or steal ...

Get CompTIA IT Fundamentals All-in-One Exam Guide (Exam FC0-U51) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.