Chapter 7. Security in Networks

In this chapter:

  • How networks differ from and are similar to single, stand-alone applications and environments

  • Threats against networked applications, including denial of service, web site defacements, malicious mobile code, and protocol attacks

  • Controls against network attacks: physical security, policies and procedures, and a range of technical controls

  • Firewalls: design, capabilities, limitations

  • Intrusion detection systems

  • Private e-mail: PGP and S/MIME

Networks—their design, development, and usage—are critical to computing, at least for the next few years. We interact with networks daily, if not more frequently, when we perform banking transactions, make telephone calls, or ride trains and planes. The utility ...

Get Security in Computing, Third Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.