6. Networks
In this chapter:
Vulnerabilities
• Threats in networks: wiretapping, modification, addressing
• Wireless networks: interception, association, WEP, WPA
• Denial of service and distributed denial of service
Protections
• Cryptography for networks: SSL, IPsec, virtual private networks
• Firewalls
• Intrusion detection and protection systems
• Managing network security, security information, and event management
As we all know, much of computing today involves interacting remotely with people, computers, processes, and even wrongdoers. You could hide in your room and never pass anything to or receive anything from outside, but that would severely limit what you could do. Thus, some degree of external connectivity is almost inevitable ...
Get Security in Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.