Chapter 3: Understanding Key Security Concepts
The previous chapter discussed and described security methodologies that can be used for security, compliance, and identity protection. This chapter will continue to build on those methodologies and how they are used within key security concepts for protecting our data and identities. Once you have completed this chapter, you will have an understanding of how to identify common threats and the concepts of encryption to protect against exposure of data.
In this chapter, we're going to cover the following main topics:
- Describing common threats
- Describing encryption