You are previewing TCP/IP Illustrated, Volume 1: The Protocols.

TCP/IP Illustrated, Volume 1: The Protocols

Cover of TCP/IP Illustrated, Volume 1: The Protocols by Kevin R. Fall... Published by Addison-Wesley Professional
O'Reilly logo

18. Security: EAP, IPsec, TLS, DNSSEC, and DKIM

18.1. Introduction

In this chapter we will take a look at several forms of security used with TCP/IP. Security is a very broad and interesting topic, and covering it comprehensively is far beyond the scope of this book. Consequently, we will be interested to know about the various types of security threats on the Internet, and we will delve into some detail on those security mechanisms aimed at countering them that are applicable to the operation of various protocols such as IP, TCP, and the important e-mail and DNS application protocols.

Although our partitioning is not really formal, security threats can be broken down into attacks that target implementation problems by trying to subvert processes ...

The best content for your career. Discover unlimited learning on demand for around $1/day.