15
Explain the security implications of proper hardware, software, and data asset management
Introduction
This chapter covers the second objective in Domain 4.0, Security Operations, of the CompTIA Security+ exam.
In this chapter, we will explore the acquisition and procurement process, followed by the assignment, ownership, and classification of assets. We will consider the importance of standard naming conventions for the labeling and identification of computer systems, as well as monitoring and asset tracking, to ensure all equipment has been accounted for. The final sections will review the types and methods of data sanitization and destruction of end-of-life devices to prevent data breaches.
This chapter will give you an overview of why ...
Get CompTIA Security+ SY0-701 Certification Guide - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.