Chapter_4_L06_L09
Chapter_4_L06_L09
Chapter_4_L06_L09
Security Professionals
Chapter 4
Cybersecurity
By Tom Mowbray
These policies are essential for network security for the following
reasons:
• Over the lunch hour, the administrator does some personal Internet
browsing and stumbles upon a website that performs a cross-site
scripting (XSS) attack.
• Dependent on OS types
• Onscreen instructions in case of GUI installer
• Before installation , unpack archived folder
STEPS:
» Create new folder in C drive
» Write click the folder and select properties
» Go to the Sharing tab and click the Share button
» Click security tab, enable the users and permissions for
the users and groups desired
Uses a public key or password. Uses the same authentication methods as SSH
Used for secure remote communication and Used for secure file transfer and manipulation.
command execution