Cryptography Uses and Firewalls

CHAPTER

16

N OW THAT WE HAVE COVERED NETWORK SECURITY and some of the basics of cryptography as ways to defend against threats to information from interception as it transits from point to point, or as it is stored on host platforms or laptops, or even smart phones, we will turn our attention to understanding some other uses of cryptography. Also we will elaborate further on how virtual private networks (VPNs) operate, and we will then cover the vanguard of corporation infrastructure: the firewall, including firewall implementations, configuration, management, and architecture.

Chapter 16 Topics

This chapter:

•  Discusses certificates (such as X.509) and certificate authorities.

•  Presents internal aspects ...

Get Information Security for Managers now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.