Computer Security

CHAPTER

14

COMPUTER (OR SOMETIMES CALLED HOST) security mainly involves carefully managing computer systems by controlling and monitoring events, services, processes, and configurations. Most operating systems have incorporated mechanisms for identification and authorization of users, but more protections are needed. In addition to these “built-in” security features, systems may require biometric devices, or multiple credentials and other measures and ways of validating those credentials, along with security rights management facilities. They may also require the implementation of security applications such as host-based intrusion detection systems (HIDS), application-layer firewalls, and virus scanners. Equally important ...

Get Information Security for Managers now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.