- CCNA Security 210-260 Certification Guide
- Glen D. Singh Michael Vinod Vijay Anandh
- 79字
- 2025-02-22 12:45:07
Summary
In this chapter, we covered security policies that protect the assets and the objectives of the business, and the different components of a security policy, which are governing policy, technical policy, and guidelines and job aids. We then covered risks, vulnerabilities, threats, assets, countermeasures, zones, network equipment, and regulatory compliance.
In the next chapter, we will learn about cryptography and its types, services offered by cryptography, different types of ciphers, and different types of encryption algorithms.