Staying with Security Protocols
In This Chapter
Protocols in this chapter: TCP, UDP, FTP, HTTP, ICMP, telnet
Involving all users in TCP/IP security
Prescribing preventive medicine to prevent security contagion
Recognizing advanced malware infection
Diagnosing network contagions
Using the netstat, ps, and syslog tools to diagnose network ailments
Looking through Microsoft proprietary logs
Being connected to a network, especially the Internet, comes with security risks. Is it worth it? For most people and organizations, the answer is yes, but a few important precautions are usually necessary. Security topics are spread throughout this book in several chapters, especially Chapters 12 and 14. Chapter 12 introduces a minimum of security concepts and terminology, including the worst that can happen to your computer and network, and points you to some tools to avoid those attacks. Both chapters introduce encryption and authentication. This chapter builds on Chapters 12 and 14 by going into more detail about security protocols.
Before you even think about securing network protocols and services, you must secure the computers (and their users) on the network. As classic wisdom says, “A chain is only as strong as its weakest ...