Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
ICT-Level-3.docx
Скачиваний:
2
Добавлен:
01.07.2025
Размер:
64.46 Кб
Скачать
  1. Specify Cyber security and control of the Internet

Cyber security or information technology security are the techniques of protecting computers, netwoks , programs and data from unauthorized access or attacks that are aimed for exploitation.Ensuring cybersecurity requires coordinated efforts throughout an information system.Elements of cybersecurity include:

  • Application security

  • Information security

  • Network security

  • Disaster recovery\ business continuity planning

  • End- user education

Computer security is the protection of computing systems and the data that they store or access.In a computing context ,the term security implies cybersecurity.One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks.

  1. Describe Internet protocols: ip, tcp, dmp

. Describe Internet protocols: IP, TCP, DMP.

The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. This may be either an IPv4 or IPv6 address, but either way it uniquely defines a device on the Internet.

The Internet Protocol also provides basic instructions for transferring packets between devices. However, it does not actually establish the connection or define the ordering of the packets transmitted. These aspects are handled by the Transmission Control Protocol.

Transmission Control Protocol, which works in conjunction with the Internet Protocol to transfer data between systems on the Internet.

Transmission Control Protocol (TCP)

TCP is a connection oriented protocol and offers end-to-end packet delivery. It acts as back bone for connection.It exhibits the following key features:

  • Transmission Control Protocol (TCP) corresponds to the Transport Layer of OSI Model.

  • TCP is a reliable and connection oriented protocol.

  • TCP offers:

    • Stream Data Transfer.

    • Reliability.

    • Efficient Flow Control

    • Full-duplex operation.

    • Multiplexing.

  • TCP offers connection oriented end-to-end packet delivery.

  • TCP ensures reliability by sequencing bytes with a forwarding acknowledgement number that indicates to the destination the next byte the source expect to receive.

  • It retransmits the bytes not acknowledged with in specified time period.

TCP Services

TCP offers following services to the processes at the application layer:

  • Stream Delivery Service

  • Sending and Receiving Buffers

  • Bytes and Segments

  • Full Duplex Service

  • Connection Oriented Service

  • Reliable Service

What is a data management platform ? In simple terms, a data management platform is a data warehouse. It’s a piece of software that sucks up, sorts and houses information, and spits it out in a way that’s useful for marketers, publishers and other businesses.

This sounds like a database. Is it more? In theory, DMPs can be used to house and manage any form of information, but for marketers, they’re most often used to manage cookie IDs and to generate audience segments, which are subsequently used to target specific users with online ads. With the rise of ad tech, advertisers now buy media across a huge range of different sites and through various middlemen, including DSPs, ad networks and exchanges. DMPs can help tie all that activity and resulting campaign and audience data together in one, centralized location and use it to help optimize future media buys and ad creative. It’s all about better understanding customer information.