Hardening Host Network Services
In the previous module, we looked at protecting a host from various threats through hardening its operating system and applications via patching, secure configuration settings, and other methods. These methods go a long way toward stopping threats that might materialize on a host, but remember that hosts don’t live in an insulated world. They are connected to other hosts and the Internet via networks, and they require the use of network protocols and services to communicate. Even if we lock down the host configuration as much as possible, it can still be vulnerable because of network connections. These connections are an absolute necessity in the connected world we live in, so we can’t simply eliminate ...
Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.