Summary
Having completed this chapter, you have a lot of knowledge that's vital in better understanding the need for implementing a DiD approach in any organization to secure assets. Furthermore, you learned about various key security terminologies, which will help you to better understand what threats are, as well as learning how threat actors use exploits to take advantage of vulnerabilities they discover on a target system. You explored the need to always protect both PII and PHI as threat actors are interested in stealing those types of data and selling it on the dark web. Lastly, we took a deep dive into the need for risk management and access control models within an enterprise organization.
I hope this chapter has been informative for you and is helpful in your journey toward learning the foundations of cybersecurity operations and gaining your Cisco Certified CyberOps Associate certification.
In the next chapter, Chapter 4, Understanding Security Principles, you...