O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Telecommunications and network security

The vast majority of the valuable information assets of an organization either establish the networking infrastructure or are accessed over the networking infrastructure. Because the world has evolved to a state in which most information is stored and accessed electronically, a deep understanding of the architectures, systems, protocols, and processes that make up the networking infrastructure is required if you hope to secure these assets.

Although much of this chapter addresses the technical aspects, you should also recognize the need to secure physical access to the systems that make up the networking infrastructure, including the servers in the data center and elsewhere. The infrastructure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required