Summary
Understanding IT systems architecture, whether on a laptop, server, phone, or IoT device, is important for a security administrator because it enables them to identify potential vulnerabilities, implement appropriate security controls, and ensure that the entire ecosystem is protected against threats, regardless of the platform or device being used. Encryption is a core part of how information passes through architectures and, properly applied, it is an important tool for any secure system.
In this chapter, you covered system architectures as well as the security issues around virtual systems and containers. You saw how encryption is used across architectures to protect information and how devices are protected with more encryption. You saw different encryption solutions and which ones are better to use, when to use them, and their best applications. This chapter also covered vulnerabilities with encryption, and that it has a life cycle and is important to update encryption...