< IT Security < Objectives
IT Security/Objectives/Security Architecture
3.1 Compare and contrast security implications of different architecture models.
|
|
3.2 Given a scenario, apply security principles to secure enterprise infrastructure.
|
|
3.3 Compare and contrast concepts and strategies to protect data.
|
|
3.4 Explain the importance of resilience and recovery in security architecture.
|
|
This article is issued from Wikiversity. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.