Introduction

A large majority of our focus in this book so far has been protecting data from attacks, alteration, or manipulation. We now shift the focus from protecting the data to protecting the systems, people, and buildings that store and use the data in day-to-day operations.

Understanding and implementing software encryption, firewalls, cryptography, and Public Key Infrastructure (PKI) is all for nothing if an intruder can simply walk into your building or offices and walk away with your physical computer systems. Encrypting your stored data will only prolong the process of getting at the data. If theft occurs and someone has physical ownership of a server, even the toughest encryptions can be broken.

Chapter 1, “General Security Concepts,” ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.