In this chapter, you will learn how to
• Explain the threats to local PC security
• Describe physical access control and device hardening
• Select appropriate user account types
These days, you can’t afford to be blissfully unaware when it comes to computer security. Threats to your security, privacy, and computer lurk around every corner. Through your devices, a malicious person (an attacker) can gain valuable information about you and your habits. An attacker can steal your files or run programs that log your keystrokes to pilfer account names and passwords, credit card information, and more. An attacker could even run software that takes over your computer to send spam or steal ...