Along with the most current certified ethical hacker content, Certified Ethical Hacker Exam Prep also contains the elements that make Exam Preps such strong study aides: Comprehensive coverage of exam topics, end-of-chapter review, practice questions, exam alerts, fast facts, plus an entire practice exam to test your understanding of the material. This book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.
In this chapter: Ethical hackers differ from malicious hackers in that ethical hackers seek to do no harm and work to improve an organization's security by thinking like a hacker. This chapter discusses the OSI model and the TCP/IP protocol suite. It looks at some of the most commonly used protocols in the suite and examines how they are used and misused by hackers. Common ports are discussed; as is the principle of deny all. Starting with all ports and protocols blocked leaves the organization in much more of a secure stance than simply blocking ports that are deemed dangerous or unneeded.
Excerpted from Certified Ethical Hacker Exam Prep by Michael Gregg (ISBN: 0789735318).
Copyright © 2006, Que Publishing. Reproduced by permission of Que Publishing. Visit Amazon.com for a detailed description and to learn how to purchase this title.
Dig Deeper on Networking Book Excerpts