Security+ - An Overview of Communications Security

From Techotopia
Revision as of 15:20, 18 February 2008 by Neil (Talk | contribs) (New page: In the previous chapter of Security+ Essentials we looked at TCP/IP port and the issue of nonessential services. Clearly a server will all ports blocked and all services disabled would...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

In the previous chapter of Security+ Essentials we looked at TCP/IP port and the issue of nonessential services. Clearly a server will all ports blocked and all services disabled would be of little use to anyone except the system administrator sitting at the system console. The simple fact is that computer systems need to be able to communicate with other systems, either on a local area network (LAN) or over wide area networks (WAN) or the internet.

The objective a good IT security strategy therefore is not to prevent all communication, but to ensure that all communication takes place as securely as possible,

In this chapter we will look at the variety of secure methods for providing remote access, transmitting email and transferring data between systems.

Remote Access