Reconnaissance, attack detection and prevention, vulnerabilities, perimeter defense, trust, access control and authorization
Michael Whitman, Herbert Mattord, David Mackey, Andrew Green
Textbook
List of port numbers commonly used by services
Identify active systems and sockets
Problems
Intrusion detection, attack surface reduction
OS processes and services, vulnerability identification and validation
Network traffic analysis
System logs and digital certificates
Linux users and groups, software firewalls