Summary

In this chapter, I covered ports and sockets. Sockets are the primary method used to communicate with services and applications. Sockets are changeable for special configurations and additional security.

Network monitors are primarily troubleshooting tools, and they can be used to eavesdrop on networks. Intrusion detection systems take an active role and can control traffic and systems. IDSs use extensive rule-based procedures to check audit files and network traffic, and they can make decisions based on those rules. In conjunction with a firewall, an IDS can offer high levels of security.

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.