Advanced Cyber Security

Encyclopedia / Encyclopedia Part 3 /

What is TCP?

There are two known primary components of Internet Protocol Suite and these are Internet Protocol (IP) and Transmission Control Protocol (TCP).

And, the term TCP/IP is generally used when talking about the whole Internet Protocol Suite.

Transmission Control Protocol is a set of rules or protocols that is utilized together with the other element of the complete suite, which is the IP.

Its main purpose is to transmit data in units among the computers all over the whole internet.

It is responsible for watching over the packets, which are the single units of data coming from a bigger message that has been segregated into smaller pieces.

The use of TCP is very much advantageous

Since it ensures an unswerving service and transport of series of bytes of an application to different computers will surely be in proper order.

According to the experts, TCP is very helpful because it is a connection-oriented protocol in which a connection is instituted at a starting point and it is maintained until the message arrives at the target endpoint.

Internet Protocol is identified for its function

Of dealing with lower-level transmissions among computers as a message is sent from one point and travels across the internet.

IP’s purpose is solely to control the transport of data.

Is designed for a more superior level transmissions that its concern includes only the two end systems.

Each of the endpoints possesses a designated IP address and a TCP port number.

An example of the two end systems are the web browser and the web server.

TCP is commonly utilized in web but it may also be employed in e-mails as well as transmitting of files.

Transmission Control Protocol also has other management purposes in which it deals with the segment size, the rate of data exchange, and it controls the flow of packets as well.

TCP ports are the most common source of breaches since most applications are running on active TCP ports.

Example Web services can be running on TCP port 443, 80 Where SMTP services can be running on TCP port 25, 587.

Due to open TCP ports being the focus point of incoming attacks it is recommended to do a full port scan of the perimeter for open TCP ports.

Set firewall permission rules so that only trusted TCP ports are open to the Internet.

Vulnerability Scanner - Vulnerability Management

➤ Related pages
Anti Spam Firewall VPN
Appliance VS Software
Cloud Security
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is GSM Encryption?
What is Grey Listing?
What is Port Knocking?
What is Spyware?
What is TCP?
What is UDP?
What is UTM?
What is Virus?
What is Whitelisting?
What is a Man in the Middle Attack?
What is a Routing Table?
What is search engine hacking?
WiFi Pen Test