O'Reilly logo

CompTIA IT Fundamentals All-in-One Exam Guide (Exam FC0-U51) by Mike Meyers, Scott Jernigan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11

Local Computer Security Threats and Best Practices

In this chapter, you will learn how to

•  Explain the threats to local PC security

•  Describe physical access control and device hardening

•  Select appropriate user account types

These days, you can’t afford to be blissfully unaware when it comes to computer security. Threats to your security, privacy, and computer lurk around every corner. Through your devices, a malicious person (an attacker) can gain valuable information about you and your habits. An attacker can steal your files or run programs that log your keystrokes to pilfer account names and passwords, credit card information, and more. An attacker could even run software that takes over your computer to send spam or steal ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required