Security+ Study Guide

The Following Comptia Security+ Exam Objectives are Covered in this Chapter:

A number of encryption standards are available to use. However, your choices may be limited by your working environment, the technologies you have available, and by any contractual agreements you have made. Many encryption standards were developed to address a specific need or application. This chapter addresses the more common standards and methods that are used to manage the systems used in the security implementation process.

In order to implement a secure environment, you need to have a broad understanding of the capabilities of the technology you are using. To do so, you should conduct a comprehensive evaluation of the management processes you will need in order to implement a supportable system in your environment.

This chapter discusses the origins of common standards and protocols. It builds on the last chapter's discussion of cryptography. It also discusses key management and the key life cycle.

Категории