Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

4/20/2021
12:30 PM
Joan Goodchild
Joan Goodchild
Edge Features
0%
100%

7 Old IT Things Every New InfoSec Pro Should Know

Beneath all those containers and IoT devices, there's a rich patchwork of gear, protocols, and guidelines that have been holding it together since before you were born. Knowledge of those fundamentals is growing more valuable, not less.

(image by xiaoliangge, via Adobe Stock)
(image by xiaoliangge, via Adobe Stock)

How TCP/IP Works

"Most security features were added later, on top of the old TCP/IP stack and network applications, and deep knowledge of the protocols themselves can greatly help in predicting the potential pitfalls, and how to secure modern IT environments. So, good understanding of the OSI model [more to come on that] and well-known protocols of the TCP/IP stack is a strong recommendation for anyone dealing with network security."

—Ramil Khantimirov, co-founder and CEO, StormWall

Over the past two years, security researchers have been exposing deep and extensive vulnerabilities in the TCP/IP stack. Scores of vulnerabilities affecting a wide variety of devices have been unveiled under the code names Ripple20, Amnesia:33, Number:Jack, and most recently Name:Wreck.  

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio
Previous
2 of 8
Next
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Name That Edge Toon: In Tow
Flash Poll