O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

OSI layers and security

The upcoming section covers some important protocols in OSI layers. Application layer protocols, presentation layer protocols, session layer protocols, and their security are covered in this chapter. The remaining layers are covered in the next chapter.

This section also gives an overview of security weaknesses in such layer/protocols as well as security measures to mitigate such weaknesses.

Application layer protocols and security

In the application layer, some of the important protocols are Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), TELNET, Post Office Protocol (POP3), Internet Message Access Protocol (IMAP), Simple Mail Transfer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required