Abstract
This chapter gets to the meat of NTP security: actually securing an NTP installation, and protecting an organization from insecure NTP installations. As previously discussed, this is not always as easy as it sounds, especially given the many platforms in an organization’s network that make use of the protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Allan Liska
About this chapter
Cite this chapter
Liska, A. (2016). Securing NTP. In: NTP Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2412-0_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2412-0_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2411-3
Online ISBN: 978-1-4842-2412-0
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books