CHAPTER 19

Host-based Security

In this chapter, you will

     •   Discover the appropriate solutions to establish host security

     •   Understand how to implement the appropriate controls to ensure data security

     •   Examine host-based security controls and applications

     •   Learn how to ensure data security across multiple environments

Host-based security takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole. When host-based security is used, each computer is relied upon to protect itself. A wide array of options can be employed at the host level as part of an enterprise security solution.

Host Security

Most environments are filled ...

Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.