Nếu nói đến điều này, cài đặt lại là nhanh hơn! Khởi động Thông thường (Start Windows thường) tiếp tục khởi động bình thường. Khởi động lại (Windows XP) Như tên của nó, khởi động lại máy tính (khởi động ấm áp). Quay trở lại menu lựa chọn hệ điều hành (Windows XP Chỉ) Tự giải thích, | In this chapter we will look at we will look at security from a more detailed viewpoint than was done in Chapter 9. Not only is the topic important enough that CompTIA added it to the Essentials exam with the latest version but they also added it to every elective exam as well. So ubiquitous is the topic you cannot escape it in the real world or the exam world. It is highly recommended that you read Chapter 9 as you study for your elective exam in addition to this chapter. Understanding Security Baselines One of the first steps in developing a secure environment is to develop a baseline of the minimum security needs of your organization. A security baseline defines the level of security that will be implemented and maintained. You can choose to set a low baseline by implementing next to no security or a high baseline that doesn t allow users to make any changes at all to the network or their systems. In practicality most implementations fall between the two extremes you must determine what is best for your organization. Microsoft provides a tool for establishing a security baseline and for subsequent evaluations of security on Windows 2000 and higher OSs with the Microsoft Security Baseline Analyzer. The baseline provides the input needed to design implement and support a secure network. Developing the baseline includes gathering data on the specific security implementation of the systems with which you ll be working. One of the newest standards for security is Common Criteria CC . This document is a joint effort between Canada France Germany the Netherlands the United Kingdom and the United States. The standard outlines a comprehensive set of evaluation criteria broken down into seven Evaluation Assurance Levels EALs . EAL 1 to EAL 7 are discussed here EAL 1 EAL 1 is primarily used when the user wants assurance that the system will operate correctly but threats to security aren t viewed as serious. EAL 2 EAL 2 requires product developers to use good design .