DistributedNetworks DistributedNetworks

Securing Resources   «Prev  Next»
Lesson 10

Intro Securing resources

As you have learned, TCP/IP protocol[1] is a powerful and popular protocol. However, it is also inherently insecure, not only because of its popularity, but also because of its open-source nature. Anyone can consult the Internet Request for Comments[2] (RFCs) of a protocol and learn all the idiosyncrasies of its design.
This module will discuss how you can implement a security model to help protect the most often-attacked servers that use TCP/IP, including HTTP, FTP, and SMTP servers.


By the end of this module, you will be able to:
  1. Consistently apply security principles
  2. Secure an operating system
  3. Secure TCP/IP services, including HTTP and FTP
  4. Apply security principles to secure servers, applications, and gateways

[1](TCP/IP) Transmission Control Protocol/Internet Protocol: A suite of protocols that turns information into blocks of information called packets. These are then sent across networks such as the Internet.
[1] Request for Comment (RFC) : The written definitions of the protocols and policies of the Internet.