Network Security
In this installment we will examine networking. We know networking to be the hinge-pin for all communications and specifically on our connected world. While networking protocols are time-tested and extremely robust their under-pinnings come from a time when specific design considerations were made based on limited infrastructure capabilities. We live today on a network that continues to have threats based on those early design decisions.
In this chapter we will look specially at
- SNIFFING AND SPOOFING
- SYN FLOODING
- DNS Spoofing