IT Security/Objectives/Security Architecture
3.1 Compare and contrast security implications of different architecture models.
edit
|
|
3.2 Given a scenario, apply security principles to secure enterprise infrastructure.
edit
|
|
3.3 Compare and contrast concepts and strategies to protect data.
edit
|
|
3.4 Explain the importance of resilience and recovery in security architecture.
edit
|
|