Task 4.10: Securing Data to Satisfy FIPS 140-2 Using PGP Desktop
You have implemented several techniques to protect sensitive data on computer systems. Why would you need another? If your organization is subject to any legal or regulatory compliance requirements, a core component of most of these is the requirement for “prudent security” to be the foundation of the information systems. A way to demonstrate prudent security in your environment is to base your IT system configuration on preestablished standards or published best practices.
In the United States, the National Institute of Standards and Technology (NIST) publishes sets of standards for implementing various types of technologies, including secure IT systems. One of these standards ...
Get Security Administrator Street Smarts: A Real World Guide to CompTIA Security+™ Skills, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.