LIST OF FIGURES
Figure 1.1 Customer data can exist across a variety of locations
Figure 2.1 Information security provides a protective layer against external attacks
Figure 2.2 Defence in depth implies a multi-layered approach to protecting security assets
Figure 2.3 Security domains group technology elements that need to be secured in a similar way
Figure 2.5 Security control points exist at the boundaries of security domains
Get Security Architect now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.