CHAPTER 13Understanding Networking Protocols

When more than two computers are involved in the communications pathway, a network is formed and additional controls must be put into place to make certain that information is sent to the correct member of the network. This is in addition to controlling the flow of information on the network connection. These controls are implemented as a set of rules called protocols. In this chapter, you’ll learn to:

  • Discuss basic network protocols
  • Identify components associated with different IP addressing standards
  • Discuss security issues associated with MAC addressing
  • Identify the components and operation of the TCP/IP protocol suite and identify its vulnerabilities
  • Provide examples of network subnetting ...

Get Cybersecurity Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.