Abstract: This article focuses on the network security. Transmission Control Protocol and Internet Protocol (TCP/IP) is a very complex protocol. The base part of the protocol is called Internet Protocol (IP). It is the IP part of the protocol that actually transports the packets of data between the various computer systems on the Internet. The part of the protocol that actually ports data to the applications is called Transmission Control Protocol (TCP). TCP is the mechanism that allows the World Wide Web (WWW) to communicate. The TCP is intended for use as a highly reliable host-to-host protocol between hosts in packet-switched computer communication networks. Hacking into computers can include port scanning, or surfing. Hackers can take advantage of the systems and processes built into the TCP/IP architecture. Denial-of-service attacks are TCP/IP attacks (although not limited to just TCP/IP) designed to tie up servers (or workstations) by sending a series of bogus requests. A well-directed denial-of-service attack is likely to have some impact on computing business infrastructure, by not accepting bogus requests.
Publication Year: 2003
Publication Date: 2003-01-01
Language: en
Type: book-chapter
Indexed In: ['crossref']
Access and Citation
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot