This document discusses securing TCP/IP networks. It covers four main areas of TCP/IP security: encryption, non-repudiation, authentication, and authorization. Encryption involves scrambling data so it can only be unscrambled by the intended recipient. Common encryption standards discussed include asymmetric key algorithms which allow secure key exchange. Secure TCP/IP applications then use these standards and tools to protect data in transit, such as HTTPS which uses SSL/TLS encryption for web traffic security.