8

Architecture Vulnerabilities and Cryptography

This chapter covers the commonalities between different computing architectures, including servers, cloud computing, and the Internet of Things (IoT). Because these computing devices share common architectures, some common threats and vulnerabilities must be considered. In this chapter, we will begin by looking at IT architecture as a whole, and discuss engineering standards and processes and different architectures.

In this chapter, you will explore the different types of encryption processed by computers, including their needs and purposes, and when and where they can be used. You will also learn about the different types of encryption attacks and mitigations.

By the end of this chapter, you ...

Get Certified Information Systems Security Professional (CISSP) Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.