Hardware Reference
In-Depth Information
sharing and encryption and parental controls. You also learned about the risks of using
unsecure wireless networks and the importance of using fi rewalls to block attacks on
unused ports. Finally, we discussed web browser security, and you learned about the many
types of malware attacks and how to defend against them.
Exam Essentials
Recognize basic security risks and procedures to prevent them. Security risks come in
many forms, including physical safety, social engineering, malware, and identity fraud. You
should understand each of these threat types and know how to counteract them, both with
common sense and with specifi c utilities and procedures.
Identify security breach prevention methods. User awareness and education is one of
the most important prevention methods. Others include wireless encryption, browser
security settings, antimalware software, fi rewalls, and strong passwords that are frequently
changed.
Identify access control methods. Passwords and user IDs are the most common access
control method used. Make sure you understand how to create an effective password.
Other access control methods include locks, parental controls, smart cards, fi ngerprint
readers, and screensavers.
Understand browser safety configuration. A web browser can be made more secure by
controlling various features such as cookies, pop-ups, secure browsing (SSL), and ActiveX
control downloads.
Diagnose malware infections. Symptoms of malware infection include sluggish-running
applications and OSs, disabled antivirus software, and odd messages. Run a full antivirus
scan if possible, or use an online antivirus troubleshooter if your antivirus software
isn't working. Quarantine or delete any infected fi les, and escalate the problem to the IT
professionals in your organization if appropriate.
Search WWH ::




Custom Search