Introduction

The final chapter of this book focuses on the task of managing security. Different chapters have focused on different areas of the network. We have introduced and discussed hardware, software, protocols, and processes used to deploy and configure security for modern networks and facilities. This chapter strives to identify ways to make all these security components work together to achieve a long-term security configuration. Like any modern business process, security requires constant maintenance and management to work properly. Deploying security is really only half the battle, though. You also have to manage and adjust your security system on a constant basis.

Companies today often deploy systems and processes in a piecemeal fashion, ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.