O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

A large majority of our focus in this book so far has been protecting data from attacks, alteration, or manipulation. We now shift the focus from protecting the data to protecting the systems, people, and buildings that store and use the data in day-to-day operations.

Understanding and implementing software encryption, firewalls, cryptography, and Public Key Infrastructure (PKI) is all for nothing if an intruder can simply walk into your building or offices and walk away with your physical computer systems. Encrypting your stored data will only prolong the process of getting at the data. If theft occurs and someone has physical ownership of a server, even the toughest encryptions can be broken.

Chapter 1, “General Security Concepts,” ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required