Chapter 6
Application Security
About This Chapter
As you have seen in earlier chapters, there are many different ways in which an attacker might attempt to compromise your network. In this chapter you learn how attackers might try to exploit applications on your network. The focus is placed primarily on client applications, as securing servers is covered in Chapter 8, "Security Baselines."
Before You Begin
This chapter assumes the basic knowledge of TCP/IP as presented in Chapter 2, "TCP/IP Basics." You should also understand certificates as presented in Chapter 3, "Certificate Basics."
In this chapter you will find references to software programs that have been developed to help manage security issues. These software programs are provided as examples of what is available in the industry. We strongly recommend that you research these products fully before attempting to use them.