Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 3. Infrastructure Security > Security Topologies

3.3. Security Topologies

The full name of this section from the Security+ objectives list is "Understand the concepts behind the following kinds of Security Topologies."Knowing how to use security topologies to manage assets of different values is an essential tool in designing, implementing, and sustaining a secure environment.

3.3.1. Critical Information

Security topologies are areas, whether physical or logical, that have different levels of security, privacy, protection, sensitivity, or capabilities. The following sections discuss the key security topologies covered on the Security+ exam.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint