{"id":575,"date":"2024-01-25T12:49:06","date_gmt":"2024-01-25T17:49:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=575"},"modified":"2024-04-02T11:23:18","modified_gmt":"2024-04-02T15:23:18","slug":"we-have-learnt-a-few-protocols-in-this-module-like-http-ftp-smtp-search-for-any-other-well-known-protocols-and-answer-the-following","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/01\/25\/we-have-learnt-a-few-protocols-in-this-module-like-http-ftp-smtp-search-for-any-other-well-known-protocols-and-answer-the-following\/","title":{"rendered":"Module 2: We have learnt a few protocols in this module like HTTP, FTP, SMTP. Search for any other well-known protocols and answer the following."},"content":{"rendered":"\n<ol>\n<li>Full form<\/li>\n\n\n\n<li>Port number<\/li>\n\n\n\n<li>What it does \/ Functionality<\/li>\n\n\n\n<li>Any interesting news articles about them, like a security breach or vulnerabilities<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<ol>\n<li>SIP (Session Initiation Protocol)<\/li>\n\n\n\n<li>Port 5060 (unencrypted) or 5061 (encrypted)<\/li>\n\n\n\n<li>Used for voice, messaging, and other services\/applications between two or more points on the IP network.&nbsp;<\/li>\n\n\n\n<li>in 2016, IBM published an article warning about the rise of SIP cyber attacks that accounted for 51% of security events within that year. The article explains how to best prevent an attack and what caused the attack to be so effective.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p><strong>Reference:<\/strong><\/p>\n\n\n\n<p><em>IBM warns of rising VoIP cyber-attacks<\/em>. CSO Online. (2016, December 1). https:\/\/www.csoonline.com\/article\/559047\/ibm-warns-of-rising-voip-cyber-attacks.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reference: IBM warns of rising VoIP cyber-attacks. CSO Online. (2016, December 1). https:\/\/www.csoonline.com\/article\/559047\/ibm-warns-of-rising-voip-cyber-attacks.html<\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/575"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/575\/revisions"}],"predecessor-version":[{"id":653,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/575\/revisions\/653"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}