Chapter 11: TCP/IP Networks

  • On Ethernet networks, use switches to isolate traffic.

  • Consider using low-level encryption mechanisms in enterprise networks, or to “tunnel” through external networks.

  • Do not depend on IP addresses or DNS information for authentication.

  • Do not depend on header information in news articles or email as they can be forged.

Get Practical UNIX and Internet Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.