Cover by Ryan Benedetti, Al Anderson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

O'Reilly logo

Chapter 11. Network Security: Get Defensive

image with no caption

The network’s a dangerous place to make a living.

Attackers lurk around every corner: rootkits, and script kiddies, and bots... oh my! You’ve got to buck up and harden your network, or the barbarians will crash the gates. In this chapter, we expose you to the seedy underworld of the network, where attackers spoof MAC addresses, poison your ARP cache, infiltrate your internets, sneak packets into your network, and trick your co-workers into coughing up their passwords. Get defensive, dude! Let’s keep our precious data in and the interlopers out.

The bad guys are everywhere

You’ve put together crucial services like DNS, you’ve used troubleshooting to keep your network free of bugs, and you’ve set up a wireless network. The last thing you need now is someone infiltrating your network and messing up all the crucial data you have flying back and forth at top speeds.

As a network professional, you need to protect your networks from the bad guys and stop them from stealing information and launching deadly attacks on your servers.

It is not unusual to have a new server attacked within minutes of being turned on.

The evil impersonator

image with no caption

The evil attacker

image with no caption

And it’s ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required