Experienced hackers understand how to exploit network operations through the Transmission Control Protocol/Internet Protocol (TCP/IP)
They are also knowledgeable as to how a packet is constructed and routed. The goal of network and security administrators is to protect against hacker intrusions.
This requires extensive knowledge of the TCP/IP suite to properly program firewall filters.
In this module, you will learn the critical aspects of each of the TCP/IP layers.
There is a growing popularity of Linux as network OS
in defense organizations with increasing military adoption of Linux IP security with
some modifi cations for secured military network transactions.
When you have completed this module, you should be able to
Open Systems Interconnect (OSI):
Describe how network security is affected at the Transmission Control Protocol/Internet Protocol (TCP/IP) levels
Describe the physical and data link layers of a network
Identify the Internet layer and its weaknesses
Identify the transport layer (TCP/UDP)and its weaknesses
Identify the application layer and its weaknesses
Discuss the security implications of commonly used applications
Describe theOpen Systems Interconnect (OSI) model and how packets are sent across the Internet
A model for for network communications standardized by ISO,
containing seven primary layers; the physical, data link, network, transport, session, presentation and applications.