官术网_书友最值得收藏!

Summary

We should now have a full understanding of the principle of Least Privilege Security and its implementation in Windows, from the early days of no real security in consumer editions of the operation system to today's push towards Least Privilege Security in Windows 7. Before proceeding to the next chapter, we have:

  • Understood how system privileges are used to control the aspects of an operating system's configuration that users can change
  • Familiarized ourselves with the principle of Least Privilege Security, and how it is implemented in different versions of Microsoft Windows
  • Become aware of the technical advantages and disadvantages that Least Privilege Security brings to desktop computing
  • Understood the business benefits of Least Privilege Security on the desktop

In the next chapter, we will move on temporarily from the technical aspects of implementing Least Privilege Security on the desktop, to talk about the cultural and political challenges, which for many can be harder to overcome.

主站蜘蛛池模板: 平邑县| 东安县| 黔西| 安阳市| 类乌齐县| 合阳县| 谢通门县| 图木舒克市| 洪江市| 图木舒克市| 富平县| 浠水县| 闽清县| 微博| 大理市| 天水市| 平塘县| 鄂尔多斯市| 南丰县| 永嘉县| 吉林省| 河西区| 栾城县| 渭南市| 丁青县| 民和| 西宁市| 西安市| 江城| 普兰店市| 江达县| 肥东县| 盘锦市| 射阳县| 奉贤区| 万安县| 高台县| 中山市| 九龙坡区| 泸西县| 和平县|