INVITATION TO CYBERSECURITY 42 layers. Application programmers and Internet users exist at the network edge and can remain oblivious to most of the work that takes place. In this chapter we uncovered just some of the magic involved in computer networks as we examined packet switching, IP addressing, and packet sniffing. This chapter provides enough depth to set the stage for an introduction to the main concerns of cybersecurity covered in the remainder of this book. However, students desiring to go into cyber operations and the more technical aspects of cybersecurity will need a much deeper level of familiarity with cyberspace—this is just the start!
RkJQdWJsaXNoZXIy MTM4ODY=