4.8. Summary

This chapter covered most of the major points concerning communications monitoring, IDS, wireless technologies, and instant messaging. Your network infrastructure is vulnerable, but the situation isn't hopeless. Tools exist to help you do your job.

Many different protocols may exist in your network. Each protocol has its own strengths and weaknesses. You must know what they are and how to deal with them. Network product vendors have become forthcoming about their products' vulnerabilities; make sure you consult them to determine what problems exist. Protocols such as NetBEUI and NetBIOS aren't routable protocols, but they can be encapsulated in TCP/IP traffic and shipped to other networks using VPN technology.

The primary tools ...

Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.