Describe, Recognize, or Select Basic Weaknesses in TCP/IP Networking

The level of security on any TCP/IP-enabled network depends entirely on the capabilities and design of the operating systems or software used on the network. In fact, the way that any implementation of TCP/IP (or other network resources) handles security depends entirely on how TCP/IP is designed. TCP/IP security issues include how a particular implementation performs connection handshaking, monitors established connections, and handles errors between systems on a network. Also, additional security features or models may be applied alongside or on top of core TCP/IP protocols, such as IP Security, Secure Sockets Layer (SSL), and so forth.

Numerous TCP/IP protocol implementations ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.