V. Appendixes
This part discusses some of the most common ways an intruder can breach computer systems or
intercept data in transit. This part also details some of the most commonly used services and their
associated port numbers, which can be useful to administrators looking to mitigate the risks of being
cracked.
Table of Contents
A. Hardware and Network Protection ............................................................................................ 97
B. Common Exploits and Attacks ................................................................................................. 101
C. Common Ports............................................................................................................................ 105
Need help?
Do you have a question about the ENTERPRISE LINUX 3 - SECURITY GUIDE and is the answer not in the manual?
Questions and answers