Introduction xiii
Assessment Test xvii
Chapter 1 Using Digital Resources Responsibly 1
Chapter 2 What Are Vulnerabilities and Threats? 17
Chapter 3 Controlling Access to Your Assets 37
Chapter 4 Controlling Network Connections 63
Chapter 5 Encrypting Your Data at Rest 85
Chapter 6 Encrypting Your Moving Data 97
Chapter 7 Risk Assessment 113
Chapter 8 Configuring System Backups and Monitoring 127
Chapter 9 Resource Isolation Design Patterns 143
Appendix Answers to Review Questions 155
Index 167