CHAPTER 9
Protecting Remote Access
As you learned earlier in Part II, computers do not have to be connected to other computers to be at risk. Although many computers might not be part of a corporate network, almost all modern personal computers at least occasionally get attached to the largest data network in the world: the Internet. As such, these standalone computing and control devices are exposed to corruption and exploitation from remote sources.
- Analyze and Differentiate Between Anti-Virus/Anti-Malware Products.
- Secure the Web Browser of a Standalone Computing Device.
- Configure and Test a Local Firewall Installation.
- Explain the Importance of Application Security.
- Audit Local Operating System Services and Events.
- Establish a Local Security Policy on a Standalone Host Device.
- Describe the Importance of Conducting Local Updates and Patch Maintenance Activities.
Protecting Local Computing Devices
There are nine basic steps for protecting local computing devices from Internet...