Monitoring Network Security Vulnerabilities

 

Network servers have devices on them known as ports. Each port is set up to understand a certain type of language. There are ports, for instance, for database applications, website content, e-mail, instant messaging/chat, etc.

They are similar to channels on television or a CB radio. Each port is either open or closed to the outside world, meaning it will "listen" to requests for that type of service. If a port is open, it is an opportunity for a hacker to attempt to access data or files on that server. Some ports need to be open, such as the port for web content on your Internet server.

Others should not be (like the e-mail or database ports on the same server). Opening unnecessary ports can expose sensitive data and systems to hackers.

If hackers are able to access your network, the damage they can do is extensive. Depending on what parts of the server/network they reach, they could steal data, deface your website, or worse.

  • 0 Bu dökümanı faydalı bulan kullanıcılar:
Bu cevap yeterince yardımcı oldu mu?

İlgili diğer dökümanlar

How to order SiteLock

  You may click here to place an order for SiteLock for your site.

Application Scanning

  Application scanning will verify the applications you've installed on your website...

How do i access my Sitelock Dashboard?

  You can access your SiteLock dashboard by following the following steps:  Login to your...

Preventing Cross-Site Scripting (XSS)

  Cross-Site Scripting, or XSS, is a type of attack used by hackers to control the content...

Reputation Monitoring

  SiteLock's patent-pending 360-degree scan helps you make sure your website and...