Table of Contents
Preface
Part 1: Foundations
1
Introduction to Cybersecurity
What is cybersecurity?
Access control
Secure software development
Business continuity planning/disaster recovery (BCP/DR)
Cryptography
Information security governance/risk management
Legal/regulatory/compliance and investigations
Security operations
Physical and environmental security
Security architecture
Telecommunications/network security
Confidentiality/integrity/availability
Confidentiality
Integrity
Availability
Non-repudiation
Networking and operating systems
Networking fundamentals
Operating systems in cybersecurity
Cybersecurity considerations for networking and operating systems
Applications
Understanding applications
Importance of application security
Get Cybersecurity Architect's Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.