CHAPTER 19Understanding the Environment
At this point in the book, you have learned about security vulnerabilities and solutions at three general levels: Physical Security, Local Host Security, and Local Network Security. These three levels apply to computing devices, network connectivity devices, network servers, and networking media that is controlled by an owner. This chapter is the last general security chapter in this book, and it deals with Internet security. In this chapter, you’ll learn to:
- Identify the types of players associated with the uncontrolled Internet environment
- Identify the components associated with different IP addressing techniques
- Relate basic port numbers with regard to network security
- Identify key Internet security ...
Get Cybersecurity Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.