Skip to Content
Security Strategies in Linux Platforms and Applications
book

Security Strategies in Linux Platforms and Applications

by Michael Jang
October 2010
Intermediate to advanced
512 pages
15h 1m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications

Chapter 7. Networks, Firewalls, and More

THIS CHAPTER FOCUSES ON SECURING THE SYSTEM. If your systems use the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite for networking, network packets may travel along one or more of 65,000 virtual ports. On a network as diverse as the Internet, standard port numbers facilitate communication. Services you provide online may even advertise their information in some ways. Obscurity in port numbers and other advertised information may make take your system out of the line of fire of some black-hat hackers.

System security requires regulation of packets transmitted over the network. Some services that use TCP packets can be regulated with networking access control lists (ACLs) in a system ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications, 2nd Edition

Security Strategies in Linux Platforms and Applications, 2nd Edition

Michael Jang, Ric Messier

Publisher Resources

ISBN: 9780763791896