Start a conversation

Port Scan Firewall Protection.


What is port Scan?

Port Scanning is one of the most popular reconnaissance techniques attackers use to discover services they can break into. All machines connected to a Local Area Network (LAN) or the Internet run many services that listen at well-known and not so well known ports. 

==>A port scan helps the attacker find which ports are available (i.e., what service might be listing to a port).

==> Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can, therefore, be probed further for weakness.

 

A Serious Threat

If you're smart and you're connected to the net, you're concerned about computer security. Open ports on your computers are invitations to criminal hackers and other evildoers to wreak havoc - and if you don't protect yourself, no one else will.
Any time there are open ports on one's personal computer, there is potential for the loss of data, the occurrence of a virus, and at times, even complete system compromise. It is essential for one to protect his or her virtual files, as new security risks concerning personal computers are discovered every day. Computer protection should be the number one priority for those who use personal computers. Port scanning is considered a serious threat to one's PC, as it can occur without producing any outward signs to the owner that anything dangerous is taking place.


Firewall Protection

Protection from port scanning is often achieved through the use of a firewall. A firewall monitors incoming and outgoing connections through one's personal computer. One technique used by firewall technology is the opening of all the ports at one time. This action stops port scans from returning any ports. This has worked in many situations in the past, however, most experts agree it is best to have all open ports investigated individually. Another approach is to filter all port scans going to one's computer. An individual can also choose to port scan his or her own system, which enables one to see the personal computer through the eyes of a hacker.


==>Firewalls are the best protection one can invest in with regard to port scanning. Firewalls deny outside access to an individual's personal computer. 

==>With this type of protection, a personal computer is essentially hidden from unwelcome visitors and is also protected from a variety of other hacking techniques. With firewall software, an individual is assured that his or her sensitive and personal information remains protected.
In today's age of cyber crimes, identity theft, and the myriad of other criminal activities which can be executed through electronic technology, one should never assume that he or she can be too careful. 


==>Most people who have become the victim of cyber theft, or other similar crimes, state they wish they would have paid closer attention to the tools available through which their personal computers could have been made safer, and less vulnerable to attack.

 

A firewall controls network traffic and serves two basics purposes:

We prevent incoming communications that you did not request from entering your computer; Monitor what programs on your computer are allowed to communicate out.


The firewall does this by enforcing an access control policy to permit or block (allow or deny) inbound and outbound traffic. Thus, the firewall acts as a central gateway for such traffic by denying illegitimate transfers and facilitating access which is deemed legitimate. The goal of the firewall is to prevent remote computers from accessing yours and provide notification of any unrequested traffic that was blocked along with the IP address. keep in mind, however, that a firewall is not a panacea to solve all of your security problems. If you will open ports through your firewall to allow access to an infected machine, then the firewall is no longer relevant.

 

 

Choose files or drag and drop files
Was this article helpful?
Yes
No
  1. Support-Agent

  2. Posted
  3. Updated

Comments