Chapter 20

Staying with Security Protocols

In This Chapter

Protocols in this chapter: TCP, UDP, FTP, HTTP, ICMP, telnet

Involving all users in TCP/IP security

Prescribing preventive medicine to prevent security contagion

Recognizing advanced malware infection

Diagnosing network contagions

Using the netstat, ps, and syslog tools to diagnose network ailments

Looking through Microsoft proprietary logs

Being connected to a network, especially the Internet, comes with security risks. Is it worth it? For most people and organizations, the answer is yes, but a few important precautions are usually necessary. Security topics are spread throughout this book in several chapters, especially Chapters 12 and 14. Chapter 12 introduces a minimum of security concepts and terminology, including the worst that can happen to your computer and network, and points you to some tools to avoid those attacks. Both chapters introduce encryption and authentication. This chapter builds on Chapters 12 and 14 by going into more detail about security protocols.

security.eps This entire chapter is about security, so you don’t see another Security icon after this one. Just imagine that you see one of these icons on every paragraph.

Before you even think about securing network protocols and services, you must secure the computers (and their users) on the network. As classic wisdom says, “A chain is only as strong as its weakest ...

Get TCP/IP For Dummies, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.