Chapter 7. Security in Networks

In this chapter:

  • How networks differ from and are similar to single, stand-alone applications and environments

  • Threats against networked applications, including denial of service, web site defacements, malicious mobile code, and protocol attacks

  • Controls against network attacks: physical security, policies and procedures, and a range of technical controls

  • Firewalls: design, capabilities, limitations

  • Intrusion detection systems

  • Private e-mail: PGP and S/MIME

Networks—their design, development, and usage—are critical to computing, at least for the next few years. We interact with networks daily, if not more frequently, when we perform banking transactions, make telephone calls, or ride trains and planes. The utility ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.