In the Introduction we said that this book, this collection of case studies, would be like a tour of many of the issues that a cyber security professional must be prepared to face. Any such tour, while valuable and entertaining, is restricted to showing only part of the overall picture.
In this Conclusion we will briefly talk about some of the other topics that come up in security and must be at least understood by the well-rounded security professional. Again, we had to make choices about what to include and what not to include, and after a few knock-down, drag-out fights, the following topics were selected:
Public key infrastructure