3.0 Security Architecture

3.1 Compare and contrast security implications of different architecture models.

3.2 Given a scenario, apply security principles to secure enterprise

3.3 Compare and contrast concepts and strategies to protect data

3.4 Explain the importance of resilience and recovery in security architecture