In this chapter, we covered security policies that protect the assets and the objectives of the business, and the different components of a security policy, which are governing policy, technical policy, and guidelines and job aids. We then covered risks, vulnerabilities, threats, assets, countermeasures, zones, network equipment, and regulatory compliance.
In the next chapter, we will learn about cryptography and its types, services offered by cryptography, different types of ciphers, and different types of encryption algorithms.