上QQ阅读APP看书,第一时间看更新
Summary
In this chapter, we took a look at the CIA triad and its importance, network security terminologies, types of attacks, how IP works and its vulnerabilities to network attack, and some security tools.
In the next chapter, we will look at the uses of different types of firewall and the significance of IPS in network security.