O'Reilly logo

Security Strategies in Linux Platforms and Applications by Michael Jang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Networks, Firewalls, and More

THIS CHAPTER FOCUSES ON SECURING THE SYSTEM. If your systems use the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite for networking, network packets may travel along one or more of 65,000 virtual ports. On a network as diverse as the Internet, standard port numbers facilitate communication. Services you provide online may even advertise their information in some ways. Obscurity in port numbers and other advertised information may make take your system out of the line of fire of some black-hat hackers.

System security requires regulation of packets transmitted over the network. Some services that use TCP packets can be regulated with networking access control lists (ACLs) in a system ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required