CHAPTER 9

Enterprise Security Architecture

In this chapter, you will

•   Examine configuration management concepts

•   Study data sovereignty and protection methods

•   Examine a wide range of technologies used in architectures to protect data

•   Examine methods utilized to protect data, including site resiliency and data deception techniques

Enterprises are different from simple single computers. When you have multiple systems that work together, there are architectural concerns to ensure that the elements can reliably and safely work together. Enterprise architects are all about establishing and following a standardized form for their systems, defining configurations and interfaces so that systems can work together. Numerous options are ...

Get CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)), 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.