Summary
In order for organizations to operate a successful information security program, they need to combine technology with discipline. In today's world, the security scene operates at an extraordinary pace and slows down for no one. Without covering the basics and forming a pro-active security model, organizations will be caught in an endless game of catch-upgame that they will ultimately lose.
This book presents many of the foundational principles needed to operate secure computing environments. This book also explains some of the basics: how IP networks work, how vulnerabilities are exploited, and how operating systems are both exploited and protected. The next chapter focuses on one of the most fundamental components security personnel need to understand: TCP/IP.