CHAPTER 8
Protecting the Inner Perimeter
In general, after you get past the outer perimeter defenses, you can think of the inner perimeter as part of the three-level structure illustrated in Figure 8.1. Consider this perimeter as consisting of the operating system and its application programs that form the gateway to the data stored in the interior zone (folders and files).
- Describe Local Login and User Configuration Options for Host Devices.
- Compare and Contrast the Security Features of Common Operating Systems.
- Identify Common Logging and Auditing Options for Windows and Linux Based Systems
- Explain Options for Encrypting Data at Rest in Different OS Environments
The Inner Perimeter
The valuable information we’re trying to protect is generally the digital data stored in the computer hardware in the form of different types of files. These files are created and interpreted by application programs. Without the application to interpret the...