3. A standard that defines how to establish and
maintain a network conversation by which
applications can exchange data.
1
it is a suite of communication protocols used to
interconnect network devices on the internet.
2
TCP/IP specifies how a data is exchanged over
internet by providing end to end communications
that identifies its transmission, destination, and
how it is being recived.
3
5. defines how to address and route each packet to
make sure it reaches the right destination.
1
2
Internet protocol (IP) is the network layer
communications protocol in the Internet protocol suite
for relaying datagrams across network boundaries. Its
routing function enables internetworking, and
essentially establishes the Internet.
3
Used to represent the network and what part is used
to be the hosts, or other computers on the network.
6. COMMON TCP/IP PROTOCOLS
secure adn handles
transmission of files between
computers.
http handles the
communication between a web
server and a web browser.
FILE TRANSFER
PROTOCOL
HYPERTEXT TRANSFER
PROTOCOL
7. IMPORTANCE
TCP/IP IS HIGHLY SCALABLE
AND, AS A ROUTABLE
PROTOCOL, CAN DETERMINE
THE MOST EFFICIENT PATH
THROUGH THE NETWORK. IT IS
WIDELY USED IN CURRENT
INTERNET ARCHITECTURE.
TCP/IP IS NONPROPRIETARY AND,
AS A RESULT, IS NOT CONTROLLED
BY ANY SINGLE COMPANY.
THEREFORE, THE IP SUITE CAN BE
MODIFIED EASILY. IT IS
COMPATIBLE WITH ALL OPERATING
SYSTEMS (OSES), SO IT CAN
COMMUNICATE WITH ANY OTHER
SYSTEM. THE IP SUITE IS ALSO
COMPATIBLE WITH ALL TYPES OF
COMPUTER HARDWARE AND
NETWORKS.
8. WHAT IS RISK MITIGATION?
REFERS TO THE PROCESS OF PLANNING AND
DEVELOPING METHODS AND OPTIONS TO
REDUCE THREATS—OR RISKS—TO PROJECT
OBJECTIVES. A PROJECT TEAM MIGHT
IMPLEMENT RISK MITIGATION STRATEGIES TO
IDENTIFY, MONITOR AND EVALUATE RISKS
AND CONSEQUENCES INHERENT TO
COMPLETING A SPECIFIC PROJECT, SUCH AS
NEW PRODUCT CREATION.
9. HOW TO BEST MITIGATE RISK AND
PROTECT YOUR DATA?
UPDATE AND UPGRADE SOFT WARE
LIMIT AND CONTROL ACCOUNT
ENFORCE SIGNED SOFTWARE EXECUTION POLICIES
FORMALIZE A DISASTER RECOVERY PLAN
ACTIVELY MANAGE SYSTEMS AND CONFIGURATIONS
HUNT FOR NETWORK INSTRUCTIONS
LEVERAGE SECURITY FEATURES
SEGREGATE NETWORKS
CONSIDER USING THREAT REPUTATION SERVICES
LEVERAGE MULTI-FACTOR AUTHENTICATION
MONITOR THIRD-PARTY SECURITY POSTURE
ASSUME INSIDER THREAT EXIST
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
10. SECURITY RISK ASSOCIATED WITH
INTEGRATING SYSTEM
THE PROCESS OF INTEGRATION IS STEADILY
INCREASING, WHICH LEADS TO HUGE FINANCIAL
AND MATERIAL LOSS.
INTERNAL USERS COMMITS VIOLATIONS.
ALL FORMS OF "DANGEROUS RISK GROUP"
EXISTED PROVIDES SPECIALIZED TOOLS OF
USERS ACCESS INFORMATION.
USER HAVE THE RIGHT TO PERMIT OR PROHIBIT
LOCAL ACCESS INFORMATIONS.
11. CONTINUATION
THE CURRENT STRATEGY OF INFORMATION
SYSTEMS PROTECTION IS SHOULD BE PARTIALLY
REVIEWED. ACCORDING TO THE FACT THAT FOR
A LONG TIME, THIS PROBLEM WAS SOLVED ONLY
WITH THE TOLLS OF ACCESS CONTROL, SO
COMPLETELY PROTECT THE IS FROM INSIDERS IT
WAS NOT POSSIBLE. IT CONNECTS TO THE FACT
THAT THE FUNCTIONALITY OF THESE TOOLS DO
NOT ALLOW TO PROTECT THE IS FROM THE
INTERNAL NETWORK ATTACKS
12. VULNERABILITY
IS A WORD DEREIVED FROM THE LATIN NOUN "VULNUS" OR
WOUND. THIS LED TO THE LATIN VERB VULNERARE, MEANING
TO WOUND.
SOFTWARE VULNERABLITIES ARE SECURITY FLAW, GLITCH, OR
WEAKNESS FOUND IN SOFTWARE CODE THAT COULD BE
EXPLOITED BY AN ATTACKER.
MALWARE
PHISHING
SPYWARE
ADWARE
BONETS
SPAM
-THIS ARE ALSO THE CRITICAL ERRORS IN A COMPUTER
SOFTWARE THAT CAN LEAVE DATA IN THE ENTIRE NETWORK
VULNERABLE TO A NUMBER OF MALICIOUS THREATHS INCLUDING:
1.
2.
3.
4.
5.
6.