CISSP Understand Security Capabilities of Information Systems – Bk1D3T4
Not all, but most technical information security controls are based on the hardware security capabilities that support and enable the security primitives upon which more elaborate and sophisticated security controls are implemented. What are “security primitives?” Think of a primitive as a building block, or a tool defined by some type. Often, the word “primitive” is associated with cryptography primitives, but in this case, we’re talking about the building blocks of keeping types of hardware …
CISSP Understand Security Capabilities of Information Systems – Bk1D3T4 Read More »