One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 358340
Date de publication 2017-04-24 04:44:00 (vue: 2017-04-24 04:44:00)
Titre Securing risky network ports
Texte Data packets travel to and from numbered network ports associated with particular IP addresses and endpoints, using the TCP or UDP transport layer protocols. All ports are potentially at risk of attack. No port is natively secure.“Each port and underlying service has its risks. The risk comes from the version of the service, whether someone has configured it correctly, and, if there are passwords for the service, whether these are strong? There are many more factors that determine whether a port or service is safe,” explains Kurt Muhl, lead security consultant at RedTeam Security. Other factors include whether the port is simply one that attackers have selected to slip their attacks and malware through and whether you leave the port open.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat addresses all are article associated attack attackers attacks click comes comment configured consultant correctly data determine endpoints explains factors from full has have here include its kurt layer lead leave malware many more muhl natively network numbered one open other packets particular passwords please port ports potentially protocols read redteam risk risks risky safe secure securing security selected service simply slip someone strong tcp these through transport travel udp underlying using version whether ” “each
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: