January 2015
Intermediate to advanced
944 pages
33h 37m
English
In this chapter:
Vulnerabilities
• Threats in networks: wiretapping, modification, addressing
• Wireless networks: interception, association, WEP, WPA
• Denial of service and distributed denial of service
Protections
• Cryptography for networks: SSL, IPsec, virtual private networks
• Firewalls
• Intrusion detection and protection systems
• Managing network security, security information, and event management
As we all know, much of computing today involves interacting remotely with people, computers, processes, and even wrongdoers. You could hide in your room and never pass anything to or receive anything from outside, but that would severely limit what you could do. Thus, some degree of external connectivity is almost inevitable ...