CHAPTER 20

Securing Alternative Environments

In this chapter, you will

     •   Learn how to compare and contrast alternative methods to mitigate security risks in static environments

     •   Understand the role of security in alternative environments

     •   Examine risk associated with alternative environments

Traditionally, the term computing has been associated with mainframes, servers, workstations, and network components. Today, computing also plays a role in many other environments, from ATM machines and SCADA control systems to embedded systems, smartphones, and gaming consoles.

There are a wide variety of methods that can be employed to assist in securing of non-traditional systems. Some of these are direct copies of methods employed ...

Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.