CHAPTER 10Local Host Security: Review Questions and Hands-On Exercises
Review the following summary points before proceeding to the “Review Questions” and “Exam Questions” sections at the end of this chapter to make sure you are comfortable with each concept. After completing the review, answer the review questions to verify your knowledge of the material covered in Part II.
Summary Points
- The first level of securing intelligent computing and control devices is to control access to them.
- The most obvious point of access through the outer perimeter of a PC would be its basic input devices: its keyboard, mouse, and touch-sensitive display. If someone can simply sit down in front of the system and freely use its input devices (keyboard, ...
Get Cybersecurity Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.