Summary
In the first two chapters of this book, we talked about network architecture and protocols, which brought us to this chapter, where we talked about security protocols, and how and where they are used to protect our networks.
At this point, we understand how different forms of encryption and authentication protocols work, as well as the major protocols that work in communications networks.
In the next chapter, we will talk about tools and methods for attacking networks and network protocols so that we can learn how to protect against them.