August 2016
Beginner
257 pages
8h 59m
English
Content preview from Network and Data Security for Non-Engineers
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
Start your free trial



Providing a Secure Architecture
Hacking and the deployment of an appropriate security architecture are at the forefront of every company’s attention. As many companies are experiencing their systems being hacked, security architectures can be put in place to minimize the severity of such attacks. The process begins with attempting to think like a hacker. This approach helps companies find vulnerabilities that they were not aware of and may not even have been able to envision.
Providing a Secure Architecture
There are four primary topics of secure architectures:
1. Isolation and least privilege
2. Access control concepts
3. Operating systems isolation
4. Browser isolation and least privilege
Within these topics, there are three main ...