Skip to Main Content
Cybersecurity Essentials
book

Cybersecurity Essentials

by Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
October 2018
Beginner content levelBeginner
784 pages
17h 34m
English
Sybex
Content preview from Cybersecurity Essentials

CHAPTER 8Protecting the Inner Perimeter

In general, after you get past the outer perimeter defenses, you can think of the inner perimeter as part of the three-level structure illustrated in Figure 8.1. Consider this perimeter as consisting of the operating system and its application programs that form the gateway to the data stored in the interior zone (folders and files).

Schematic illustration of the inner perimeter as part of the three-level structure. The operation of the application program and  access to the files are controlled by the operating system (OS).

FIGURE 8.1 The Inner Perimeter

  • Describe Local Login and User Configuration Options for Host Devices.
  • Compare and Contrast the Security Features of Common Operating Systems.
  • Identify Common Logging and Auditing Options for Windows and Linux Based Systems
  • Explain Options ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity – Attack and Defense Strategies - Second Edition

Cybersecurity – Attack and Defense Strategies - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya
Security in Computing

Security in Computing

Shari Lawrence Pfleeger, Charles P. Pfleeger, Jonathan Margulies

Publisher Resources

ISBN: 9781119362395Purchase book