IP Protocols and Services

The Application layer can be the most difficult layer to secure against hackers because you are at the mercy of different operating systems and applications. Add to this mix specialized software written for you by a software developer and you have the propensity for long hours researching and securing the software on your systems and servers. The next few sections outline a few of the major concerns at the Application level—mainly Internet services that your users might use and of which hackers might try to take advantage. Although the following information represents by no means the definitive works on these topics and is not the complete listing of potential points of contention, it constitutes a list of the major ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.