4.2 Carry out appropriate procedures to establish host security

Host security, not just server and network security, should be a priority. The most dangerous element in an organization is the end user. The systems end users employ to interact with company resources and the Internet need to be secured. They need to be secured against threats from the network and the Internet, but also dangers from peripherals, removable media, and the end users as well.

Operating system security and settings

There are no fully secure operating systems. All of them have security flaws. Some OSes have more security concerns than others, but every OS needs some level of security management imposed on it. Generally, security management includes keeping current on ...

Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.