SlideShare a Scribd company logo
1 of 13
Download to read offline
TRANSMISSION CONTROL
PROTOCOL
WHAT IS
WHAT IS
WHAT IS
TCP?
TCP?
TCP?
A standard that defines how to establish and
maintain a network conversation by which
applications can exchange data.
1
it is a suite of communication protocols used to
interconnect network devices on the internet.
2
TCP/IP specifies how a data is exchanged over
internet by providing end to end communications
that identifies its transmission, destination, and
how it is being recived.
3
WHAT IS
WHAT IS
WHAT IS
IP?
IP?
IP?
defines how to address and route each packet to
make sure it reaches the right destination.
1
2
Internet protocol (IP) is the network layer
communications protocol in the Internet protocol suite
for relaying datagrams across network boundaries. Its
routing function enables internetworking, and
essentially establishes the Internet.
3
Used to represent the network and what part is used
to be the hosts, or other computers on the network.
COMMON TCP/IP PROTOCOLS
secure adn handles
transmission of files between
computers.
http handles the
communication between a web
server and a web browser.
FILE TRANSFER
PROTOCOL
HYPERTEXT TRANSFER
PROTOCOL
IMPORTANCE
TCP/IP IS HIGHLY SCALABLE
AND, AS A ROUTABLE
PROTOCOL, CAN DETERMINE
THE MOST EFFICIENT PATH
THROUGH THE NETWORK. IT IS
WIDELY USED IN CURRENT
INTERNET ARCHITECTURE.
TCP/IP IS NONPROPRIETARY AND,
AS A RESULT, IS NOT CONTROLLED
BY ANY SINGLE COMPANY.
THEREFORE, THE IP SUITE CAN BE
MODIFIED EASILY. IT IS
COMPATIBLE WITH ALL OPERATING
SYSTEMS (OSES), SO IT CAN
COMMUNICATE WITH ANY OTHER
SYSTEM. THE IP SUITE IS ALSO
COMPATIBLE WITH ALL TYPES OF
COMPUTER HARDWARE AND
NETWORKS.
WHAT IS RISK MITIGATION?
REFERS TO THE PROCESS OF PLANNING AND
DEVELOPING METHODS AND OPTIONS TO
REDUCE THREATS—OR RISKS—TO PROJECT
OBJECTIVES. A PROJECT TEAM MIGHT
IMPLEMENT RISK MITIGATION STRATEGIES TO
IDENTIFY, MONITOR AND EVALUATE RISKS
AND CONSEQUENCES INHERENT TO
COMPLETING A SPECIFIC PROJECT, SUCH AS
NEW PRODUCT CREATION.
HOW TO BEST MITIGATE RISK AND
PROTECT YOUR DATA?
UPDATE AND UPGRADE SOFT WARE
LIMIT AND CONTROL ACCOUNT
ENFORCE SIGNED SOFTWARE EXECUTION POLICIES
FORMALIZE A DISASTER RECOVERY PLAN
ACTIVELY MANAGE SYSTEMS AND CONFIGURATIONS
HUNT FOR NETWORK INSTRUCTIONS
LEVERAGE SECURITY FEATURES
SEGREGATE NETWORKS
CONSIDER USING THREAT REPUTATION SERVICES
LEVERAGE MULTI-FACTOR AUTHENTICATION
MONITOR THIRD-PARTY SECURITY POSTURE
ASSUME INSIDER THREAT EXIST
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
SECURITY RISK ASSOCIATED WITH
INTEGRATING SYSTEM
THE PROCESS OF INTEGRATION IS STEADILY
INCREASING, WHICH LEADS TO HUGE FINANCIAL
AND MATERIAL LOSS.
INTERNAL USERS COMMITS VIOLATIONS.
ALL FORMS OF "DANGEROUS RISK GROUP"
EXISTED PROVIDES SPECIALIZED TOOLS OF
USERS ACCESS INFORMATION.
USER HAVE THE RIGHT TO PERMIT OR PROHIBIT
LOCAL ACCESS INFORMATIONS.
CONTINUATION
THE CURRENT STRATEGY OF INFORMATION
SYSTEMS PROTECTION IS SHOULD BE PARTIALLY
REVIEWED. ACCORDING TO THE FACT THAT FOR
A LONG TIME, THIS PROBLEM WAS SOLVED ONLY
WITH THE TOLLS OF ACCESS CONTROL, SO
COMPLETELY PROTECT THE IS FROM INSIDERS IT
WAS NOT POSSIBLE. IT CONNECTS TO THE FACT
THAT THE FUNCTIONALITY OF THESE TOOLS DO
NOT ALLOW TO PROTECT THE IS FROM THE
INTERNAL NETWORK ATTACKS
VULNERABILITY
IS A WORD DEREIVED FROM THE LATIN NOUN "VULNUS" OR
WOUND. THIS LED TO THE LATIN VERB VULNERARE, MEANING
TO WOUND.
SOFTWARE VULNERABLITIES ARE SECURITY FLAW, GLITCH, OR
WEAKNESS FOUND IN SOFTWARE CODE THAT COULD BE
EXPLOITED BY AN ATTACKER.
MALWARE
PHISHING
SPYWARE
ADWARE
BONETS
SPAM
-THIS ARE ALSO THE CRITICAL ERRORS IN A COMPUTER
SOFTWARE THAT CAN LEAVE DATA IN THE ENTIRE NETWORK
VULNERABLE TO A NUMBER OF MALICIOUS THREATHS INCLUDING:
1.
2.
3.
4.
5.
6.
THANK YOU FOR
THANK YOU FOR
THANK YOU FOR
LISTENING!
LISTENING!
LISTENING!

More Related Content

Similar to Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Editor IJARCET
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Editor IJARCET
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...IJNSA Journal
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 

Similar to Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf (20)

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 

Recently uploaded

NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...Amil Baba Dawood bangali
 
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证mestb
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样ayoqf
 
£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))
£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))
£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))Obat Cytotec
 
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec QatarBuy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatarsamsungultra782445
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.ECoyShastriBhawan
 
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...Amil baba
 
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhMatrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhjoshuaclack73
 
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样vwymvu
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证mestb
 
Vibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxVibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxjoshuaclack73
 

Recently uploaded (17)

NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
NO1 Pakistan Best vashikaran specialist in UK USA UAE London Dubai Canada Ame...
 
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(AUT毕业证书)奥克兰理工大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
如何办理(OP毕业证书)奥塔哥理工学院毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
 
£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))
£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))
£ HAMIL 5 BULAN £ CARA MENGGUGURKAN KANDUNGAN USIA 5 BULAN ((087776558899))
 
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec QatarBuy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
Buy best abortion pills Doha [+966572737505 | Planned cytotec Qatar
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
 
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UVic毕业证书)维多利亚大学毕业证成绩单本科硕士学位证留信学历认证
 
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
NO1 Best Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addre...
 
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhhMatrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
Matrix Methods.pptxhhhhhhhhhhhhhhhhhhhhh
 
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
办理(uw学位证书)美国华盛顿大学毕业证续费收据一模一样
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USYD毕业证书)悉尼大学毕业证成绩单本科硕士学位证留信学历认证
 
Abortion Pills in Jeddah |+966572737505 | Get Cytotec
Abortion Pills in Jeddah |+966572737505 | Get CytotecAbortion Pills in Jeddah |+966572737505 | Get Cytotec
Abortion Pills in Jeddah |+966572737505 | Get Cytotec
 
Abortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotec
Abortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotecAbortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotec
Abortion pills in Jeddah Saudi Arabia! +966572737505 Where to buy cytotec
 
Vibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptxVibration of Continuous Systems.pjjjjjjjjptx
Vibration of Continuous Systems.pjjjjjjjjptx
 
Abortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotec
Abortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotecAbortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotec
Abortion pills in Riyadh Saudi Arabia!+966572737505 ) Where to get cytotec
 

Elegant-and-Professional-Company-Business-Proposal-Presentation.pdf

  • 2. WHAT IS WHAT IS WHAT IS TCP? TCP? TCP?
  • 3. A standard that defines how to establish and maintain a network conversation by which applications can exchange data. 1 it is a suite of communication protocols used to interconnect network devices on the internet. 2 TCP/IP specifies how a data is exchanged over internet by providing end to end communications that identifies its transmission, destination, and how it is being recived. 3
  • 4. WHAT IS WHAT IS WHAT IS IP? IP? IP?
  • 5. defines how to address and route each packet to make sure it reaches the right destination. 1 2 Internet protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. 3 Used to represent the network and what part is used to be the hosts, or other computers on the network.
  • 6. COMMON TCP/IP PROTOCOLS secure adn handles transmission of files between computers. http handles the communication between a web server and a web browser. FILE TRANSFER PROTOCOL HYPERTEXT TRANSFER PROTOCOL
  • 7. IMPORTANCE TCP/IP IS HIGHLY SCALABLE AND, AS A ROUTABLE PROTOCOL, CAN DETERMINE THE MOST EFFICIENT PATH THROUGH THE NETWORK. IT IS WIDELY USED IN CURRENT INTERNET ARCHITECTURE. TCP/IP IS NONPROPRIETARY AND, AS A RESULT, IS NOT CONTROLLED BY ANY SINGLE COMPANY. THEREFORE, THE IP SUITE CAN BE MODIFIED EASILY. IT IS COMPATIBLE WITH ALL OPERATING SYSTEMS (OSES), SO IT CAN COMMUNICATE WITH ANY OTHER SYSTEM. THE IP SUITE IS ALSO COMPATIBLE WITH ALL TYPES OF COMPUTER HARDWARE AND NETWORKS.
  • 8. WHAT IS RISK MITIGATION? REFERS TO THE PROCESS OF PLANNING AND DEVELOPING METHODS AND OPTIONS TO REDUCE THREATS—OR RISKS—TO PROJECT OBJECTIVES. A PROJECT TEAM MIGHT IMPLEMENT RISK MITIGATION STRATEGIES TO IDENTIFY, MONITOR AND EVALUATE RISKS AND CONSEQUENCES INHERENT TO COMPLETING A SPECIFIC PROJECT, SUCH AS NEW PRODUCT CREATION.
  • 9. HOW TO BEST MITIGATE RISK AND PROTECT YOUR DATA? UPDATE AND UPGRADE SOFT WARE LIMIT AND CONTROL ACCOUNT ENFORCE SIGNED SOFTWARE EXECUTION POLICIES FORMALIZE A DISASTER RECOVERY PLAN ACTIVELY MANAGE SYSTEMS AND CONFIGURATIONS HUNT FOR NETWORK INSTRUCTIONS LEVERAGE SECURITY FEATURES SEGREGATE NETWORKS CONSIDER USING THREAT REPUTATION SERVICES LEVERAGE MULTI-FACTOR AUTHENTICATION MONITOR THIRD-PARTY SECURITY POSTURE ASSUME INSIDER THREAT EXIST 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.
  • 10. SECURITY RISK ASSOCIATED WITH INTEGRATING SYSTEM THE PROCESS OF INTEGRATION IS STEADILY INCREASING, WHICH LEADS TO HUGE FINANCIAL AND MATERIAL LOSS. INTERNAL USERS COMMITS VIOLATIONS. ALL FORMS OF "DANGEROUS RISK GROUP" EXISTED PROVIDES SPECIALIZED TOOLS OF USERS ACCESS INFORMATION. USER HAVE THE RIGHT TO PERMIT OR PROHIBIT LOCAL ACCESS INFORMATIONS.
  • 11. CONTINUATION THE CURRENT STRATEGY OF INFORMATION SYSTEMS PROTECTION IS SHOULD BE PARTIALLY REVIEWED. ACCORDING TO THE FACT THAT FOR A LONG TIME, THIS PROBLEM WAS SOLVED ONLY WITH THE TOLLS OF ACCESS CONTROL, SO COMPLETELY PROTECT THE IS FROM INSIDERS IT WAS NOT POSSIBLE. IT CONNECTS TO THE FACT THAT THE FUNCTIONALITY OF THESE TOOLS DO NOT ALLOW TO PROTECT THE IS FROM THE INTERNAL NETWORK ATTACKS
  • 12. VULNERABILITY IS A WORD DEREIVED FROM THE LATIN NOUN "VULNUS" OR WOUND. THIS LED TO THE LATIN VERB VULNERARE, MEANING TO WOUND. SOFTWARE VULNERABLITIES ARE SECURITY FLAW, GLITCH, OR WEAKNESS FOUND IN SOFTWARE CODE THAT COULD BE EXPLOITED BY AN ATTACKER. MALWARE PHISHING SPYWARE ADWARE BONETS SPAM -THIS ARE ALSO THE CRITICAL ERRORS IN A COMPUTER SOFTWARE THAT CAN LEAVE DATA IN THE ENTIRE NETWORK VULNERABLE TO A NUMBER OF MALICIOUS THREATHS INCLUDING: 1. 2. 3. 4. 5. 6.
  • 13. THANK YOU FOR THANK YOU FOR THANK YOU FOR LISTENING! LISTENING! LISTENING!