Terms you'll need to understand:
Techniques you'll need to master:
A common saying about the only truly secure computer is that it is one left in its box and connected to nothing. Although this may be an oversimplification, it is true that the moment a computer is connected to a network, the requirements for securing against unwanted intrusion multiply. In this chapter, we will examine vulnerabilities common to many standard technologies that may be exposed by connecting to a networked system. |