Summary
The basic elements of protocols were covered in this chapter. The goal was to clarify their underlying mechanisms and functionalities as well as how the protocols operate. Understanding a protocol’s workings can also help you better comprehend threats and attacks at all OSI-model levels. Regardless of their unique roles, security professionals must grasp not just the fundamentals of TCP/IP but also how they could be misused by attackers, as well as what that looks like.
In the next chapter, we will look at some of those types of attacks in greater detail when we delve into malware.