O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter covered foundational concepts in the security engineering domain. Hardware, software, or networking systems need to be secure, for which adherence to security best practices during design, development, and integration is essential. Security standards and models provide a baseline for developing and maintaining secure systems. During various stages of the information system life cycle, vulnerabilities may creep in. Hence, it is necessary to identify and assess vulnerabilities and mitigate them during development as well as during operations.

In the next chapter, we will understand the fundamentals of cryptography, its requirements in security, and its application in data security and communication security. Besides concepts ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required