CHAPTER 9Protecting Remote Access
As you learned earlier in Part II, computers do not have to be connected to other computers to be at risk. Although many computers might not be part of a corporate network, almost all modern personal computers at least occasionally get attached to the largest data network in the world: the Internet. As such, these standalone computing and control devices are exposed to corruption and exploitation from remote sources.
- Analyze and Differentiate Between Anti-Virus/Anti-Malware Products.
- Secure the Web Browser of a Standalone Computing Device.
- Configure and Test a Local Firewall Installation.
- Explain the Importance of Application Security.
- Audit Local Operating System Services and Events.
- Establish a Local ...
Get Cybersecurity Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.