25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security<br />

22<br />

This chapter discusses security issues regarding <strong>TCP</strong>/<strong>IP</strong> networks <strong>and</strong> provides<br />

an overview of solutions to prevent security exposures or problems before they<br />

occur. The field of network security in general <strong>and</strong> of <strong>TCP</strong>/<strong>IP</strong> security in particular<br />

is too wide to be dealt within an all encompassing way in this book, so the focus<br />

of this chapter is on the most common security exposures <strong>and</strong> measures to<br />

counteract them. Because many, if not all, security solutions are based on<br />

cryptographic algorithms, we also provide a brief overview of this topic for the<br />

better underst<strong>and</strong>ing of concepts presented throughout this chapter.<br />

© Copyright <strong>IBM</strong> Corp. 1989-2006. All rights reserved. 771

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!