CHAPTER 11

Local Computer Security Threats and Best Practices

In this chapter, you will learn how to

•  Explain the threats to local PC security

•  Describe physical access control and device hardening

•  Select appropriate user account types

These days, you can’t afford to be blissfully unaware when it comes to computer security. Threats to your security, privacy, and computer lurk around every corner. Through your devices, a malicious person (an attacker) can gain valuable information about you and your habits. An attacker can steal your files or run programs that log your keystrokes to pilfer account names and passwords, credit card information, and more. An attacker could even run software that takes over your computer to send spam or steal ...

Get CompTIA IT Fundamentals All-in-One Exam Guide (Exam FC0-U51) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.