IT Security/Objectives/Security Architecture
Appearance
3.1 Compare and contrast security implications of different architecture models.
[edit | edit source]
|
|
3.2 Given a scenario, apply security principles to secure enterprise infrastructure.
[edit | edit source]
|
|
3.3 Compare and contrast concepts and strategies to protect data.
[edit | edit source]
|
|
3.4 Explain the importance of resilience and recovery in security architecture.
[edit | edit source]
|
|