O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

Until this point in your studies, you've learned a number of valuable computer security principles that apply equally to any computing environment. You've explored the principles of network security, policy design, perimeter protection, and intrusion analysis, among others. In this chapter, you begin looking at the practical applications of these theories to the two most common operating systems in use today. We begin by examining operating system security issues that apply to all operating systems and then examine unique concerns for environments utilizing the Microsoft Windows family of operating systems as well as the various flavors of the Unix operating system available in today's marketplace.

As you review this material, keep ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required