A network- and transport-level protocol compilation allowing a computer to speak the same language as other computers on the Internet or on other networks. The term is used to describe the set of protocols that are used to make the Internet work with the Internet Protocol as the main player on layer 3—the network layer, and the Transmission Control Protocol on layer 4—the session layer of the protocol stack. The TCP/IP protocol stack is a technology known for its lack of security on many of its layers. Because the bulk of applications written for use on the Internet use the application layer—for example, the HTTP on port 80 on Web servers—this protocol fails to provide state-keeping mechanisms for a session between a client and the server—a flaw that crackers use to their advantage.Though the TCP/IP protocol can give reliable delivery of Internet packets, it cannot guarantee confidentiality or integrity. Ankobia, R. Vulnerabilities in Web Applications. [Online, February 25, 2005.] Guardian Digital Inc. Website. http://www.linuxsecurity.com/content/view/118427/ 49/; Hunt, C. and Cameron, D. TCP/IP Network Administration (3rd Edition). Online Books: O’Reilly Media, Inc., 2002; Internet Highway, LLC. Internet Terminology: TCP/IP. [Online, 1999.] Internet Highway, LLC. Website. http://www.ihwy.com/support/netterms.html.