SlideShare a Scribd company logo
1 of 1
Download to read offline
March 16th, 2013                                                                  Published by: Anonymous Ip Address HQ




What is a port?
                                                           it ten years ago. If your computer is not protected,
What is a port?                                            then every 20 minutes your compute is at risk of
Source: http://ipaddresshq.com/what-is-a-port/             being infected. What is worse is that malware is
A computer port can be several things. They are            often just the precursor to worse things like hackers.
sometimes used as a communication channel, and             There are a lot of people out there that are very
at other times they are used as an interface between       interested in gathering personal information and
one computer and the next or within the contexts           financial data that do not belong to them.
of a network. Computer ports may also be physical          Protecting Ports:
or virtual depending on their connection type. In
common terms, a port is really an access point or          Installing and utilizing a firewall is one of the
an outlet. Most of the time they are used to dock          preferred methods of defending ports. Upgrading
peripheral accessories to our computer. Docking is         and /or installing technology-current versions of
the computer term for plugging it into something.          antivirus/antimalware are also recommended. If
So docking a device means to plug it into a port. If       you are not very good with computers, than consider
you have a cell phone, you are constantly utilizing        an antivirus package that comes with technical
one of its ports. Each time you connect the charging       support. Once such service would be Comodo.com,
cable to the phone you are plugging the cable into         their GeekBuddy program is an award winning
a port.                                                    program. You can allow the GeekBuddy technicians
                                                           to set up your security system for you. It is a free
Ports are either Opened or Closed, and both terms          service with the antivirus suite.
are important to understand. An open port is one
that is able to receive packets of data. So the
opposite of an open port is a port that denies
packets, and this would be the definition of a closed
port. Open and closed refer to security measures
that affect how communication between a computer
and the Internet occurs. If you unplug a cord from a
port, that port might still be open, even though the
cable is no longer attached to the computer. Open
and closed can best be thought of in an electronic
sense of whether or not data can flow through the
port.
Are Ports Dangerous?
Ports are very dangerous if you do not have security
software set up to defend your ports. Trojans, which
are a form of malware, use open ports to spread
themselves throughout a network of computers.
Even as technology changes, malware still finds
a way of penetrating defences, and ports are no
exception. Statics show that it takes only 20 minutes
once malware is released to the Internet for it to find
a host. That is about half of the time that used to take

More Related Content

What's hot

Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cyber Security Courses Edinburgh – What You Have to Know About the Course
Cyber Security Courses Edinburgh – What You Have to Know About the CourseCyber Security Courses Edinburgh – What You Have to Know About the Course
Cyber Security Courses Edinburgh – What You Have to Know About the CourseIT Professional Training
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSMAU
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Right-sized security for IoT - ARM
Right-sized security for IoT - ARMRight-sized security for IoT - ARM
Right-sized security for IoT - ARMPhil Hughes
 

What's hot (10)

Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Cyber Security Courses Edinburgh – What You Have to Know About the Course
Cyber Security Courses Edinburgh – What You Have to Know About the CourseCyber Security Courses Edinburgh – What You Have to Know About the Course
Cyber Security Courses Edinburgh – What You Have to Know About the Course
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
New internet security
New internet securityNew internet security
New internet security
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
Mobile security
Mobile securityMobile security
Mobile security
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Right-sized security for IoT - ARM
Right-sized security for IoT - ARMRight-sized security for IoT - ARM
Right-sized security for IoT - ARM
 

Similar to What is a port?

TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Safety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of ThingsSafety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of ThingsIan Heron
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information SecurityRachel Phillips
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 

Similar to What is a port? (20)

Firewall
FirewallFirewall
Firewall
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
O046048187
O046048187O046048187
O046048187
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Firewall
FirewallFirewall
Firewall
 
Safety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of ThingsSafety In Numbers - Protecting Us All From The Internet of Things
Safety In Numbers - Protecting Us All From The Internet of Things
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Network security
Network securityNetwork security
Network security
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 

What is a port?

  • 1. March 16th, 2013 Published by: Anonymous Ip Address HQ What is a port? it ten years ago. If your computer is not protected, What is a port? then every 20 minutes your compute is at risk of Source: http://ipaddresshq.com/what-is-a-port/ being infected. What is worse is that malware is A computer port can be several things. They are often just the precursor to worse things like hackers. sometimes used as a communication channel, and There are a lot of people out there that are very at other times they are used as an interface between interested in gathering personal information and one computer and the next or within the contexts financial data that do not belong to them. of a network. Computer ports may also be physical Protecting Ports: or virtual depending on their connection type. In common terms, a port is really an access point or Installing and utilizing a firewall is one of the an outlet. Most of the time they are used to dock preferred methods of defending ports. Upgrading peripheral accessories to our computer. Docking is and /or installing technology-current versions of the computer term for plugging it into something. antivirus/antimalware are also recommended. If So docking a device means to plug it into a port. If you are not very good with computers, than consider you have a cell phone, you are constantly utilizing an antivirus package that comes with technical one of its ports. Each time you connect the charging support. Once such service would be Comodo.com, cable to the phone you are plugging the cable into their GeekBuddy program is an award winning a port. program. You can allow the GeekBuddy technicians to set up your security system for you. It is a free Ports are either Opened or Closed, and both terms service with the antivirus suite. are important to understand. An open port is one that is able to receive packets of data. So the opposite of an open port is a port that denies packets, and this would be the definition of a closed port. Open and closed refer to security measures that affect how communication between a computer and the Internet occurs. If you unplug a cord from a port, that port might still be open, even though the cable is no longer attached to the computer. Open and closed can best be thought of in an electronic sense of whether or not data can flow through the port. Are Ports Dangerous? Ports are very dangerous if you do not have security software set up to defend your ports. Trojans, which are a form of malware, use open ports to spread themselves throughout a network of computers. Even as technology changes, malware still finds a way of penetrating defences, and ports are no exception. Statics show that it takes only 20 minutes once malware is released to the Internet for it to find a host. That is about half of the time that used to take