As you have learned, TCP/IP protocol[1] is a powerful and popular protocol. However, it is also inherently
insecure, not only because of its popularity, but also because of its open-source nature. Anyone can consult the Internet
Request for Comments[2] (RFCs) of a protocol and learn all the idiosyncrasies of its
design.
This module will discuss how you can implement a security model to help protect the most often-attacked servers that use TCP/IP, including HTTP, FTP, and SMTP servers.
Objectives
By the end of this module, you will be able to:
Consistently apply security principles
Secure an operating system
Secure TCP/IP services, including HTTP and FTP
Apply security principles to secure servers, applications, and gateways
[1](TCP/IP) Transmission Control Protocol/Internet Protocol:
A suite of protocols that turns information into blocks of information called packets. These are then sent across networks such as the Internet.
[1]Request for Comment (RFC) :
The written definitions of the protocols and policies of the Internet.