Computer Security

CHAPTER

14

COMPUTER (OR SOMETIMES CALLED HOST) security mainly involves carefully managing computer systems by controlling and monitoring events, services, processes, and configurations. Most operating systems have incorporated mechanisms for identification and authorization of users, but more protections are needed. In addition to these “built-in” security features, systems may require biometric devices, or multiple credentials and other measures and ways of validating those credentials, along with security rights management facilities. They may also require the implementation of security applications such as host-based intrusion detection systems (HIDS), application-layer firewalls, and virus scanners. Equally important ...

Get Information Security for Managers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.