Architecture Vulnerabilities and Cryptography
This chapter covers the commonalities between different computing architectures, including servers, cloud computing, and the Internet of Things (IoT). Because these computing devices share common architectures, some common threats and vulnerabilities must be considered. In this chapter, we will begin by looking at IT architecture as a whole, and discuss engineering standards and processes and different architectures.
In this chapter, you will explore the different types of encryption processed by computers, including their needs and purposes, and when and where they can be used. You will also learn about the different types of encryption attacks and mitigations.
By the end of this chapter, you will be able to answer questions on:
- The security capabilities of information systems
- Assessing and mitigating the vulnerabilities of security architectures and designs
- Selecting and determining cryptographic solutions
- Methods...