Please enable JavaScript.
Coggle requires JavaScript to display documents.
Internal Network Security - Coggle Diagram
Internal Network Security
Port Scan as a Threat
Port Scan
An easy way to gather network information
A program designed to get which ports respond with known vulnerabilities that are still present
Port
Numbers to indentify different services
Given in the header of each packet or data unit
Ports 0 - 1023 is well-known ports
Knowledge and Exposure
Attackers can do ports scan in a couple of seconds
Attacker will know which ports are open/closed
With the information above, attacker can check for various vulnerability
User will be vulnerable and more likely to be attack
Vulnerability
The Good
Network administrator or system owners can explore their networks
Find out which device is out-of-date
Find vulnerable versions of software that should be upgraded
To document and review devices cconnected to the network
The Bad
Allow an attacker to learn about the system
More feature added to network tools will allow attacker to gain access to more information
Revealing to much
By giving to much information
All unused ports are still open
The design of system architecture
Countermeasure
Firewall
Device that filters all traffic between inside and outside
Default deny
Trust
Simple
Has many types
Application-level gateways or proxies
Circuit-level gateways
Stateful inpsection
Packet filtering
Guards
Personal firewalls