O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we covered some of the concepts in telecommunications and the network security domain.

Security requirements in voice, data, multimedia, remote access, and virtual networks are based on service availability, data confidentiality, and theft/leakage. Security requirements are addressed through prevention and mitigation strategies and communication controls.

The next chapter is a revision chapter for chapters six through nine. References and further study on these four chapters are provided. An exam cram as well as a mock test consisting of about 15 questions is also provided in the next chapter.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required