O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

This chapter discussed the various security requirements that apply to operating systems in general and Microsoft Windows and Unix systems in particular. The key concepts identified in this chapter were as follows:

  • It is essential to maintain systems regularly. Operating system vendors periodically release vital patches, service packs, and hot fixes.

  • Strong password policies protect the integrity of an installation.

  • Microsoft Windows contains a variety of tools that are vital to the security practitioner, including the Event Viewer and Active Directory Users and Computers tool.

  • Unix operating systems come in a variety of forms, but all are capable of detailed access control and logging activity.

KEY TERMS

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required