CHAPTER 9

Enterprise Security Architecture

In this chapter, you will

•   Examine configuration management concepts

•   Study data sovereignty and protection methods

•   Examine a wide range of technologies used in architectures to protect data

•   Examine methods utilized to protect data, including site resiliency and data deception techniques

Enterprises are different from simple single computers. When you have multiple systems that work together, there are architectural concerns to ensure that the elements can reliably and safely work together. Enterprise architects are all about establishing and following a standardized form for their systems, defining configurations and interfaces so that systems can work together. Numerous options are ...

Get CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)), 6th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.