Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Server+ Certification Guide

You're reading from   CompTIA Server+ Certification Guide A comprehensive, end-to-end study guide for the SK0-004 certification, along with mock exams

Arrow left icon
Product type Paperback
Published in Feb 2019
Publisher
ISBN-13 9781789534818
Length 514 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ron Price Ron Price
Author Profile Icon Ron Price
Ron Price
Arrow right icon
View More author details
Toc

Table of Contents (28) Chapters Close

Preface 1. Section 1: System Architecture FREE CHAPTER
2. Server Hardware 3. Server Internals 4. Data Storage 5. Server Operating Systems 6. Addressing 7. Cabling 8. Section 2: Administration
9. Server Administration 10. Server Maintenance 11. Virtualization 12. Disaster Recovery 13. Section 3: Security
14. Security Systems and Protocols 15. Physical Security and Environmental Controls 16. Logical Security 17. Section 4: Troubleshooting
18. Troubleshooting Methods 19. Common Hardware Issues 20. Common Software Issues 21. Common Network Issues 22. Common Storage Issues 23. Common Security Issues 24. CompTIA Server+ Examination 25. Glossary 26. Assessment 27. Other Books You May Enjoy

Common data security problems

Network servers, regardless of their application, must deal with a variety of security issues, attacks, and, in some cases, harm. These problems aren't specifically related to hardware or software, but they are problems. The security problems you should understand include the following:

  • File integrity: File integrity means that data and program files have not been the target of an attack and modified in any way by an unauthorized person or function. An attacker, either internal or external, can compromise the integrity of a file purposefully or accidentally. Monitoring the integrity of stored data and programs should be a part of a standard monitoring procedure. File integrity monitor (FIM) software uses checksums and hashing to detect changes to a file. The most common hashing algorithm used is Message Digest 5 (MD5).
  • Privilege escalation:...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image