O'Reilly logo

CompTIA Security+ All-in-One Exam Guide (Exam SY0-401), 4th Edition by Greg White, Wm. Arthur Conklin, Chuck Cothren, Roger Davis, Dwayne Williams

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 20

Securing Alternative Environments

In this chapter, you will

     •   Learn how to compare and contrast alternative methods to mitigate security risks in static environments

     •   Understand the role of security in alternative environments

     •   Examine risk associated with alternative environments

Traditionally, the term computing has been associated with mainframes, servers, workstations, and network components. Today, computing also plays a role in many other environments, from ATM machines and SCADA control systems to embedded systems, smartphones, and gaming consoles.

There are a wide variety of methods that can be employed to assist in securing of non-traditional systems. Some of these are direct copies of methods employed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required