Lesson16.Secure Network Connections


Lesson 16. Secure Network Connections

Time

This lesson takes approximately 2 hours to complete.

Goals

Understand open ports

Implement ssh, scp, and sftp

Set up a VPN client


One of the Achilles heels of computing security is the network itself. It provides the connectivity users need to collaborate, but also provides potential "stealing" points for attackers. You may use encrypted disk images, encrypted swap space, ACLs controlling access to files and folders, and myriad other proactive techniques to prevent security breaches, but as soon as you transfer a file over the network without precaution, you may leak your information.

In this lesson, you'll see how to prevent attackers from "sniffing" out secret information on a network, ensuring that the network does not become the "weakest link" in the security chain. If you assume that every network is being sniffed for secrets, you can actively ensure that your network communication will not be breached.




Apple Training Series. Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors: Schoun Regan

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net