next up previous contents
Next: 6. Host Security Solutions Up: 5. Case Studies Previous: 5.3 Combined

5.4 Summary

In this chapter we have shown examples of how host and network security is compromised using methods described previously. This brings an end to our discussion of problems with security on a host and network level. This concludes the syshackadminer's ``hacker training'' part of our technical problems of host and firewall security. With the problems covered, we now need solutions. In the next chapter, we start our discussion of providing technical solutions to the problems presented in the last three chapters. The next chapter is the beginning of the syshackadminer's ``system administrator training.''



Shaun Bangay
1998-11-19