O'Reilly logo

TCP/IP For Dummies, 6th Edition by Candace Leiden, Marshall Wilensky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 20

Staying with Security Protocols

In This Chapter

Protocols in this chapter: TCP, UDP, FTP, HTTP, ICMP, telnet

Involving all users in TCP/IP security

Prescribing preventive medicine to prevent security contagion

Recognizing advanced malware infection

Diagnosing network contagions

Using the netstat, ps, and syslog tools to diagnose network ailments

Looking through Microsoft proprietary logs

Being connected to a network, especially the Internet, comes with security risks. Is it worth it? For most people and organizations, the answer is yes, but a few important precautions are usually necessary. Security topics are spread throughout this book in several chapters, especially Chapters 12 and 14. Chapter 12 introduces a minimum of security concepts and terminology, including the worst that can happen to your computer and network, and points you to some tools to avoid those attacks. Both chapters introduce encryption and authentication. This chapter builds on Chapters 12 and 14 by going into more detail about security protocols.

security.eps This entire chapter is about security, so you don’t see another Security icon after this one. Just imagine that you see one of these icons on every paragraph.

Before you even think about securing network protocols and services, you must secure the computers (and their users) on the network. As classic wisdom says, “A chain is only as strong as its weakest ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required