Hardware Reference
In-Depth Information
Q2. True or false: In order to access a user's settings, you need to be logged in as an
admin before accessing it.
Q3. If you want the user Bart to watch and listen to the house's contents, you will set
his role as:
1.
Authenticated user
2.
Anonymous
3.
Administrator
Q4. True or false: Security requires enough additional time. Having an extra
10 minutes to obtain these details and write down lists is not useful. After all,
your network already has some credentials
Summary
We have been through a dense chapter. You might not be a security-passionate person,
but it is most likely that you can now understand why you should consider this topic,
and maybe your point of view might have changed. Hopefully you'll take a few
minutes to define your security strategy based on the examples in this chapter.
Remember to find answers to the who, what, and how questions through the lists
you have defined at the start so that you just need to set or use predefined roles in
the Groups and user interfaces.
Using real-world and practical examples, we saw how the Springfield house is
organized to let everyone be happy with media, in the bedroom or even in the garden.
We also saw how security can be applied to professional aspects as well, with the
hope this part will help you the next time you need to apply a security strategy
and architecture.
We will now leave the MediaDrop world to let you provide the content and become
an actor yourself and share movies.
In the next chapter, we will be more creative, as we will set up our own content as
well as services.
 
Search WWH ::




Custom Search