Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Server+ Certification Guide

You're reading from   CompTIA Server+ Certification Guide A comprehensive, end-to-end study guide for the SK0-004 certification, along with mock exams

Arrow left icon
Product type Paperback
Published in Feb 2019
Publisher
ISBN-13 9781789534818
Length 514 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ron Price Ron Price
Author Profile Icon Ron Price
Ron Price
Arrow right icon
View More author details
Toc

Table of Contents (28) Chapters Close

Preface 1. Section 1: System Architecture FREE CHAPTER
2. Server Hardware 3. Server Internals 4. Data Storage 5. Server Operating Systems 6. Addressing 7. Cabling 8. Section 2: Administration
9. Server Administration 10. Server Maintenance 11. Virtualization 12. Disaster Recovery 13. Section 3: Security
14. Security Systems and Protocols 15. Physical Security and Environmental Controls 16. Logical Security 17. Section 4: Troubleshooting
18. Troubleshooting Methods 19. Common Hardware Issues 20. Common Software Issues 21. Common Network Issues 22. Common Storage Issues 23. Common Security Issues 24. CompTIA Server+ Examination 25. Glossary 26. Assessment 27. Other Books You May Enjoy

Logical Security

Physical security (see Chapter 12, Physical Security and Environmental Controls) protects an organization and its computing assets and resources from damage, destruction, and theft. Logical security is not the opposite of physical security. Rather, it's another part of security as a whole. Logical security has the same overall objectives as physical security—to protect, prevent, detect, and deter intrusions against a very valuable resource for any organization.

In this chapter, we will look at the various methods, procedures, and technology used to implement logical security policies to safeguard the data, software, and computing assets of an organization. We will cover the following topics:

  • Access control
  • Data encryption
  • Data retention and disposal
  • Physically destroying a disk drive
  • OS, system, application, and hardware hardening
...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image