CHAPTER 8

Security Solutions for Infrastructure Management

In this chapter you will learn:

•   Common network architectures and their security implications

•   How to manage assets and changes

•   Technologies and policies used to identify, authenticate, and authorize users

•   Different types of encryption and when to use them

You can’t build a great building on a weak foundation.

—Gordon B. Hinckley

In Part I of this book, we looked at how adversaries operate against our systems. We now turn our attention to the architectural foundations of the systems they’ll be attacking and we are defending. Though we would all agree that it is difficult to protect something we don’t understand, a remarkable number of security professionals are not fully ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.