Hardening Host Network Services

In the previous module, we looked at protecting a host from various threats through hardening its operating system and applications via patching, secure configuration settings, and other methods. These methods go a long way toward stopping threats that might materialize on a host, but remember that hosts don’t live in an insulated world. They are connected to other hosts and the Internet via networks, and they require the use of network protocols and services to communicate. Even if we lock down the host configuration as much as possible, it can still be vulnerable because of network connections. These connections are an absolute necessity in the connected world we live in, so we can’t simply eliminate ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.