Chapter10

Securing TCP/IP

“Better to be despised for too anxious apprehensions than ruined by too confident a security.”

—Edmund Burke

Image

In this chapter, you will learn how to

Discuss the standard methods for securing TCP/IP networks

Compare TCP/IP security standards

Implement secure TCP/IP applications

TCP/IP wasn’t designed with any real security in mind. Oh sure, you can put usernames and passwords on FTP, Telnet, and other TCP/IP applications, but everything else is basically wide open. Every device with a public IP address on the Internet is constantly bombarded with malicious packets trying to gain some level of access to precious ...

Get Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition (Exam N10-008), 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.