CHAPTER 17Local Security

In this chapter, you will learn how to

• Explain the threats to your computers and data

• Describe key security concepts and technologies

Your PC is under siege. Through your PC, a malicious person can gain valuable information about you and your habits. He can steal your files. He can run programs that log your keystrokes and thus gain account names and passwords, credit card information, and more. He can run software that takes over much of your computer processing time and use it to send spam or steal from others. The threat is real and right now. Worse, he’s doing one or more of these things to your clients as I write these words. You need to secure your computer and your users from these attacks.

But what does ...

Get CompTIA Strata IT Fundamentals All-in-One Exam Guide (Exam FC0-U41) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.