Chapter 2. Computer Systems Security
This chapter covers the following subjects:
Computer Systems Security Threats—This portion of Chapter 2 can help you to differentiate between the various computer security threats you should be aware of for the exam including malware in all of its forms, spam, privilege escalation, and more. Then we discuss how to defend against those threats in a proactive way, and how to fix problems that do occur in the case that threats have already manifested themselves. By far, this is the most important section of this chapter; study it carefully!
Implementing Security Applications—In this section, you learn how to select, install, and configure security applications such as personal firewalls, antivirus programs, ...