Because forming a mental map of the terms and ideas in a domain is an important place to start your learning journey, this chapter began with an overview of the entire security space. The “core chart” of this chapter’s taxonomy is Figure 18- 1, which illustrates the essential security domains and methods and a few of the many tools professionals use to secure networks and data.
All security can be classified into
• Confidentiality, or keeping private things private.
• Integrity, or making sure data is not unintentionally or intentionally changed.
• Availability, or maintaining systems so users can access the data and applications they need to get things done.
The section part of this chapter considered the importance of security and some of the many tools available for keeping user information private. Network engineers often skip over privacy for various reasons. This is a mistake. We should all take privacy seriously.
Finally, this chapter considered how AAA systems work.
The next chapter focuses on attacks. Once again, we start by building a mental map of the space.
One key to doing well on the exams is to perform repetitive spaced review sessions. Review this chapter’s material using either the tools in the book or interactive tools for the same material found on the book’s companion website. Refer to the online Appendix D, “Study Planner,” element for more details.
Table 18-3 outlines the key review elements and where you can find them. To better track your study progress, record when you completed these activities in the second column.
Table 18-3 Chapter Review Tracking
Review All the Key Topics
Table 18-4 lists the key topics for this chapter.
Table 18-4 Key Topics for Chapter 18
Concepts and Actions
Review the concepts considered in this chapter using Table 18- 5. You can cover the right side of this table and describe each concept or action in your own words to verify your understanding.
Table 18-5 Concepts and Actions