Introduction xiiiAssessment Test xviiChapter 1 Using Digital Resources Responsibly 1Chapter 2 What Are Vulnerabilities and Threats? 17Chapter 3 Controlling Access to Your Assets 37Chapter 4 Controlling Network Connections 63Chapter 5 Encrypting Your Data at Rest 85Chapter 6 Encrypting Your Moving Data 97Chapter 7 Risk Assessment 113Chapter 8 Configuring System Backups and Monitoring 127Chapter 9 Resource Isolation Design Patterns 143Appendix Answers to Review Questions 155Index 167
ABOUT THE AUTHORDAVID CLINTON is a Linux server administrator with experience working in IT infrastructure in academic and enterprise environments. He is the co-author of AWS Certified Solutions Architect Study Guide: Associate (SAA-C03) Exam, Fourth Edition and AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam.