Lesson 16. Secure Network Connections
One of the Achilles heels of computing security is the network itself. It provides the connectivity users need to collaborate, but also provides potential "stealing" points for attackers. You may use encrypted disk images, encrypted swap space, ACLs controlling access to files and folders, and myriad other proactive techniques to prevent security breaches, but as soon as you transfer a file over the network without precaution, you may leak your information. In this lesson, you'll see how to prevent attackers from "sniffing" out secret information on a network, ensuring that the network does not become the "weakest link" in the security chain. If you assume that every network is being sniffed for secrets, you can actively ensure that your network communication will not be breached. |