Extending OSI to Network Security -- Chapter 1 of 'Hack the Stack'

Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (OSI) model and use it to present security topics in a new and unique way.

About this chapter: Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (OSI) model and use it to present security topics in a new and unique way.

About this book: Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.

Read the rest of Extending OSI to Network Security in this PDF.


Excerpted from Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of An Insecure Network by Michael Gregg (ISBN: 1597491098). Copyright 2006, Syngress Publishing. All rights reserved.

Dig Deeper on Networking Book Excerpts

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close