Extending OSI to Network Security -- Chapter 1 of 'Hack the Stack'

Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (OSI) model and use it to present security topics in a new and unique way.

About this chapter: Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (OSI) model and use it to present security topics in a new and unique way.

About this book: Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.

Read the rest of Extending OSI to Network Security in this PDF.


Excerpted from Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of An Insecure Network by Michael Gregg (ISBN: 1597491098). Copyright 2006, Syngress Publishing. All rights reserved.

This was first published in November 2006

Dig deeper on Networking Book Excerpts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close