Extending OSI to Network Security -- Chapter 1 of 'Hack the Stack'

Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (OSI) model and use it to present security topics in a new and unique way.

About this chapter: Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (OSI) model and use it to present security topics in a new and unique way.

About this book: Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.

Read the rest of Extending OSI to Network Security in this PDF.


Excerpted from Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of An Insecure Network by Michael Gregg (ISBN: 1597491098). Copyright 2006, Syngress Publishing. All rights reserved.

This was last published in November 2006

Dig Deeper on Networking Book Excerpts

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close