Chapter10
Securing TCP/IP
“Better to be despised for too anxious apprehensions than ruined by too confident a security.”
—Edmund Burke
In this chapter, you will learn how to
■ Discuss the standard methods for securing TCP/IP networks
■ Compare TCP/IP security standards
■ Implement secure TCP/IP applications
TCP/IP wasn’t designed with any real security in mind. Oh sure, you can put usernames and passwords on FTP, Telnet, and other TCP/IP applications, but everything else is basically wide open. Every device with a public IP address on the Internet is constantly bombarded with malicious packets trying to gain some level of access to precious ...
Get Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition (Exam N10-008), 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.