The Vital Protocols

1. One protocol that is very important in cybersecurity is the Transmission Control Protocol.

2. The transmission control protocol operates on a variety of port numbers such as Port 21, which is the control channel and Port 22, which is used for SSH (ActiveCountermeasures, 2021.)

3. The transmission control protocol allows data transfers in a network (Fortinet, 2023.)

4. In 2021, fourteen vulnerabilities were discovered in TCP that had an effect on industrial networks (Vijayan, 2021.)


References:

What is TCP/IP in networking?. Fortinet. (2023). https://www.fortinet.com/resources/cyberglossary/tcp-ip

Stearns, B. (2021, October 6). What is this TCP or UDP Port. Active Countermeasures. https://www.activecountermeasures.com/what-is-this-tcp-or-udp-port/

Vijayan, J. (2021, August 9). 14 vulnerabilities found in widely used TCP/IP stack. Dark Reading. https://www.darkreading.com/vulnerabilities-threats/14-vulnerabilities-found-in-widely-used-tcp-ip-stack

Leave a Reply

Your email address will not be published. Required fields are marked *