Capture.PNG
Document Details

Uploaded by jlopez59#
Tags
Related
- Networking and Security Midterm PDF
- Computer Network Security Study Guide PDF
- Week 8 - 2425-Network Planning-Hardware-Security PDF
- Computer Networking and IT Security (CNS) Slides PDF
- Computer Science: Networking and the Internet (2015) PDF
- Distributed Systems: Networking Concepts PDF - Computer Networks
Full Transcript
## Chapter Summary (1 of 3) - A long password is a strong password - Use Local Group Policies and Local Security Policies to secure a Windows computer - The Internet Options dialog box is used to manage many Internet Explorer settings - Encrypting File System (EFS) encrypts files and folders on an...
## Chapter Summary (1 of 3) - A long password is a strong password - Use Local Group Policies and Local Security Policies to secure a Windows computer - The Internet Options dialog box is used to manage many Internet Explorer settings - Encrypting File System (EFS) encrypts files and folders on an NTFS file system - BitLocker Drive Encryption encrypts an entire volume on a hard drive - Access to folders and files on a network is controlled by assigning privileges to user accounts and assigning permission to folders and files - Apply the principle of least privilege when assigning privileges to users - You can create customized user groups to make it easier to manage privileges to multiple user accounts