2
Network Protocol Structures and Operations
In Chapter 1, Data Centers and the Enterprise Network Architecture and its Components, we discussed network architectures and how an organization's network is built. In this chapter, we will take a look at the protocols that work in the network, and we will examine the vulnerabilities and potential risks of each of them.
In this chapter, we will cover network protocols and the risks of not properly securing each one of them. Additionally, we will examine the potential risks, while, in the later protocol chapters, we will explore how to attack them and how to protect against these attacks.
We will begin with the Open Systems Interconnection Reference Model (OSI-RM) and data flow through the network. ...
Get Network Protocols for Security Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.