Summary
This chapter explored asset management and its role in security. You learned about the acquisition and procurement process, including the importance of strategic evaluation when acquiring new assets. This was followed by a review of tracking asset usage and maintenance, as well as the adoption of standard naming conventions to assist with the labeling and identification of computer systems. Finally, you explored disposal and decommissioning, which are crucial practices for the secure removal of data from assets that have reached the end of their operational life.
The knowledge gained in this chapter will prepare you to answer any questions relating to Exam Objective 4.2 in your CompTIA Security+ certification exam.
The next chapter will be Chapter 16, Explain various activities associated with vulnerability management.