In this chapter, we took a look at many types of flaws within the TCP/IP stack, starting at the Application Layer and going down to the Network Access Layer. We saw how attackers can compromise a trusted website to simply steal sensitive data from the user's web browser, use ICMP to perform malicious activities, and create specially crafted TCP SYN packets that can be used to perform a DoS attack on the protocol and the system. Lastly, we've mentioned various cyber security appliances and controls that can be implemented to help prevent or mitigate these threats and attacks on a network, while protecting your assets in the organization.
In the next chapter, we will explore the topic of organizational security.