A.12 Chapter 11: TCP/IP Networks

  • On Ethernet networks, use switches to isolate traffic.

  • Consider using low-level encryption mechanisms in enterprise networks, or to "tunnel" through external networks.

  • Do not depend on IP addresses or DNS information for authentication.

  • Do not depend on header information in news articles or email as they can be forged.

    Part VI: Appendixes