Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
- Length: 241 pages
- Edition: 1
- Language: English
- Publisher: Apress
- Publication Date: 2023-01-10
- ISBN-10: 1484289382
- ISBN-13: 9781484289389
- Sales Rank: #1450071 (See Top 100 Books)
Learn the skills and solutions required to secure your Mac’s operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!
Ok, there’s no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey – not a simple action or software application. And that is exactly what you’ll learn to master―the foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it’s your personal iMac or a fleet of MacBook Pro’s assigned to the remote employees within your organization, you’ll be able to limit access while identifying and mitigating risk unique to your environment.
In addition to the information security best practices pertaining to protecting Apple computers, you’ll pivot to a coherent, security-focused mindset to better understand macOS-specific security. You’ll learn how it works and what tools and software are available to help. Both native and 3rd-party tool are covered. Safe guard your system’s privacy data and capitalize on effectively locking down the security of your Mac computers against known threats and newer trends that continue to evolve.
Hardening Your Macs is the perfect roadmap to stopping malicious attacks and bad actors from spying on users through cameras, microphones, and other built-in tools that could potentially be used against users and organizations alike.
What You’ll Learn
- Grasp the mindset of attackers―how they plan and execute malicious incursions
- Implement hardware solutions as well as software safeguards
- Take advantage of Apple’s built-in macOS security features in addition to 3rd party tools
- Avoid attacks on your system that could compromise sensitive corporate data and personally identifiable information
Who This Book Is For
IT admins responsible for managing Mac device security. Additionally users of Apple products that may have some experience using the platform in general but are not versed in security, as well as, those switching from Windows platforms will find useful information here. And anyone that wishes to expand their information security skills and/or develop a security-focused mindset to better protect their personal information and privacy data from the numerous and growing threats in the wild, such as malware and phishing.
Table of Contents About the Author About the Technical Reviewer Acknowledgments Introduction Chapter 1: Security 101 Introduction What Is It? Why Is It Important? When Is It Necessary? Who Is Responsible for It? Summary Chapter 2: Risky Business Risk Assessments Matrix Appetite Tolerance Summary Chapter 3: A World of Hurt Threats Attacks Internal External Summary Chapter 4: The Mind Stone Think Like Them Act Like Them Understand Them Protect Against Them Summary Chapter 5: (Return of) the Mac macOS Hardware Software Distribution Frameworks Security Privacy Summary Chapter 6: Lock It Down Hardening Process Minimizing the Attack Surface Identifying Vectors Workarounds Summary Chapter 7: The Outer Limits Startup Volume-Level Encryption Cable Lock Sensor Covers Accessories Licensed Cables Summary Chapter 8: Inside Job Passwords Login System Preferences User Account Types Multifactor Authentication FileVault Screen Saver Lock Screen Malware Protection Firewall VPN Zero Trust iCloud Mac App Store Secure Memory Transparency, Consent and Control (TCC) Touch ID Software Update Third-Party Patches File and Folder Permissions Sharing Preferences System Integrity Protection (SIP) Extensions Time Machine Remote Wipe Summary Chapter 9: Work Smarter, Not Harder Remote Controlling Your Fleet Mobile Device Management (MDM) Device Configuration App Deployment Securing Devices Automating Workflows Zero Touch Summary Chapter 10: Have a Plan and Stick to It Standardize Your Environment Develop Workflows to Address Common Issues Automate Whenever Possible Stay on Top of the Latest Security Threats Train Yourself (and Users) to Recognize Threats Align with Security Frameworks Comply with Regulatory Requirements Design a Defense In-Depth Plan Summary Index
Donate to keep this site alive
How to download source code?
1. Go to: https://github.com/Apress
2. In the Find a repository… box, search the book title: Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
, sometime you may not get the results, please search the main title.
3. Click the book title in the search results.
3. Click Code to download.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.