IP Protocols and Services

The Application layer can be the most difficult layer to secure against hackers because you are at the mercy of different operating systems and applications. Add to this mix specialized software written for you by a software developer and you have the propensity for long hours researching and securing the software on your systems and servers. The next few sections outline a few of the major concerns at the Application level—mainly Internet services that your users might use and of which hackers might try to take advantage. Although the following information represents by no means the definitive works on these topics and is not the complete listing of potential points of contention, it constitutes a list of the major ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.