官术网_书友最值得收藏!

Summary

We should now have a full understanding of the principle of Least Privilege Security and its implementation in Windows, from the early days of no real security in consumer editions of the operation system to today's push towards Least Privilege Security in Windows 7. Before proceeding to the next chapter, we have:

  • Understood how system privileges are used to control the aspects of an operating system's configuration that users can change
  • Familiarized ourselves with the principle of Least Privilege Security, and how it is implemented in different versions of Microsoft Windows
  • Become aware of the technical advantages and disadvantages that Least Privilege Security brings to desktop computing
  • Understood the business benefits of Least Privilege Security on the desktop

In the next chapter, we will move on temporarily from the technical aspects of implementing Least Privilege Security on the desktop, to talk about the cultural and political challenges, which for many can be harder to overcome.

主站蜘蛛池模板: 安泽县| 扶绥县| 布尔津县| 蒙阴县| 定安县| 广丰县| 睢宁县| 酉阳| 瑞丽市| 增城市| 安丘市| 昌平区| 江油市| 满洲里市| 于田县| 广昌县| 吴旗县| 金溪县| 葫芦岛市| 桦南县| 德令哈市| 弋阳县| 灵台县| 象山县| 广水市| 绥江县| 平山县| 诸暨市| 栾川县| 宁阳县| 简阳市| 米脂县| 海原县| 十堰市| 千阳县| 陵水| 峨山| 玉田县| 秦皇岛市| 东丰县| 辽宁省|