CHAPTER 20Computer Security

ITINERARY

Objective 20.01 Analyzing Security Threats

Objective 20.02 Protecting Local Computers

Objective 20.03 Protecting Networked Computers

Image

Your PC is under siege. Through your PC, a malicious person can gain valuable information about you and your habits. He can steal your files or run programs that log your keystrokes to learn account names and passwords, credit card information, and more. He can run software that takes over much of your computer processing time and use it to send spam or steal from others. The threat is real and right now. Even worse, he’s doing one or more of these things to your clients ...

Get Mike Meyers' CompTIA A+ Certification Passport, Fourth Edition (Exams 220-701 & 220-702), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.