CHAPTER 19
Understanding the Environment
At this point in the book, you have learned about security vulnerabilities and solutions at three general levels: Physical Security, Local Host Security, and Local Network Security. These three levels apply to computing devices, network connectivity devices, network servers, and networking media that is controlled by an owner. This chapter is the last general security chapter in this book, and it deals with Internet security. In this chapter, you’ll learn to:
- Identify the types of players associated with the uncontrolled Internet environment
- Identify the components associated with different IP addressing techniques
- Relate basic port numbers with regard to network security
- Identify key Internet security organizations and standards
The Basics of Internet Security
In the early days of the Internet, security was mostly about passwords. In many cases, passwords were birthdays or pet names and used a few different technologies. We were...