O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Describe, Recognize, or Select Basic Weaknesses in TCP/IP Networking

The level of security on any TCP/IP-enabled network depends entirely on the capabilities and design of the operating systems or software used on the network. In fact, the way that any implementation of TCP/IP (or other network resources) handles security depends entirely on how TCP/IP is designed. TCP/IP security issues include how a particular implementation performs connection handshaking, monitors established connections, and handles errors between systems on a network. Also, additional security features or models may be applied alongside or on top of core TCP/IP protocols, such as IP Security, Secure Sockets Layer (SSL), and so forth.

Numerous TCP/IP protocol implementations ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required