SlideShare a Scribd company logo
3
Most read
7
Most read
11
Most read
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Scan a website and find out what open ports
are actively running and what are the
functions, benefits and threats of such ports
being opened
Name: Bidgar Gaurav Dada
Batch : June 2024
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Agenda
• Introduction to Scan a website and find out what open ports are actively
running and what are the functions, benefits and threats of such ports
being opened using the tools
• Tool utilized to scan a website
• What are open ports
• Scanning a website using Nmap for open ports
• Functions, Benefits and Threats of open ports
• Mitigation
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Introduction :
• The purpose of this project is to scan the website "JadeBlue" for open
ports and analyze their functions, benefits, and potential threats. Open
ports are a crucial part of any networked system, and understanding
them helps in both ensuring the security of the system and optimizing its
performance.
• For this project, tools such as Nmap will be used to perform the scan.
Once open ports are identified, the functions of those ports will be
analyzed, including their standard use cases. We will also assess the
security implications of having these ports open.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Tool utilized to scan a website
• Nmap(Network Mapper):
 Nmap is short for Network Mapper. It is an open-source Linux
command-line tool that is used to scan IP addresses and ports in a
network and to detect installed applications.
Nmap allows network admins to find which devices are running on
their network, discover open ports and services, and detect
vulnerabilities.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
What are open ports?
• Open ports identify network endpoints that allow data exchange
between devices.
• Ports facilitate various internet services and applications, allowing them
to function properly. While open ports themselves do not threaten your
network’s security, they can be abused by hackers. So, open ports must
be properly maintained to reduce the number of entry points for
malicious actors
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Scanning a website using Kali Linux and Nmap for open ports
• Kali Linux is a popular operating system for cybersecurity professionals, and it comes
pre-installed with Nmap.
• Using Kali Linux and Nmap to find open ports
• Step 1: Open Kali Linux Terminal
Launch the terminal on Kali Linux. You can usually find it in the applications
menu or by using the shortcut Ctrl + Alt + T.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Scanning a website using Kali Linux and Nmap for open
ports
• Step 2: Run Nmap Command
• In this project, we will scan hostname/website “JadeBlue.com” as a target to find
open ports. It’s a shopping website.
URL: "https://www.jadeblue.com/"
• Use the following command into the terminal, replacing [target] with the IP address
or hostname of the target
nmap [target]
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Scanning a website using Kali Linux and Nmap for open
ports
• Step 3: Wait for Scan to Complete
• Nmap will start scanning the target
for open ports. This process may
take some time depending on the
size of the network and the scan
options used.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Scanning a website using Kali Linux and Nmap for open
ports
• Step 4: Review Scan Results
• Once the scan is complete, Nmap will display
a list of open ports on the target device or network.
Analyze these results to understand which
services are running and potential security risks.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Open ports which are actively running
• In this Nmap scan, we found ten open ports which are actively running.
25/tcp (SMTP) – Simple Mail Transfer Protocol
80/tcp (HTTP) – Hypertext Transfer Protocol
110/tcp (POP3) – Post Office Protocol 3
143/tcp (IMAP) – Internet Message Access Protocol
443/tcp (HTTPS) – Hypertext Transfer Protocol Secure
587/tcp (Submission) – Email Message Submission
993/tcp (IMAPS) – IMAP Secure
995/tcp (POP3S) – POP3 Secure
8080/tcp (HTTP-PROXY)
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Analysis of Open Ports:
Port Service Name Function Benefits Threats
25/tcp SMTP Used for sending emails.
Enables email functionality for the
server.
Can be used for spam distribution, vulnerable to
relay attacks, and DDoS attacks.
80/tcp HTTP Standard protocol for web traffic.
Allows users to access the website
without encryption.
Vulnerable to MITM attacks, Cross-Site Scripting
(XSS), and SQL injection.
110/tcp POP3
Protocol for retrieving emails from the
server.
Commonly used for email retrieval by
clients.
Unencrypted data transfer, susceptible to
eavesdropping and phishing.
143/tcp IMAP
Allows email clients to access email
messages.
Provides more advanced features like
folder management.
Vulnerable to sniffing attacks if not encrypted,
and email account hijacking.
443/tcp HTTPS
Secure version of HTTP using SSL/TLS
encryption.
Provides secure communication
between the user and the server.
Can be vulnerable if SSL/TLS misconfigured or
weak certificates used.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
port Services Functions Benefits. Threats
587/tcp Submission
Used by email clients to send emails
securely (SMTP over TLS).
Secure way to send emails, protects user
credentials.
Potential misconfiguration, but more secure than
SMTP on port 25.
993/top IMAPS Secure IMAP over SSL/TLS.
Provides secure email access with
encryption, preventing eavesdropping.
Can still be vulnerable to weak encryption
protocols or improper certificate management.
995/tcp POP3S Secure POP3 over SSL/TLS.
Provides secure email retrieval with
encryption.
Similar threats as IMAPS, especially if outdated
SSL/TLS protocols are used.
8080/tcp HTTP-Proxy
Alternative HTTP port, often used for
proxies or admin panels.
Useful for proxy servers or alternate HTTP
services.
Common target for exploits, often misconfigured,
and can expose admin panels.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Mitigation
• Shut down any ports that are not necessary for your system’s operation.
• Configure a firewall to block unauthorized access to open ports.
• Regularly update your system and applications to patch any known
vulnerabilities
• Implement access controls to restrict who can connect to open ports
• Conduct periodic security assessments to identify and address any
vulnerabilities associated with open ports.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Questions ?
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Thank You!

More Related Content

PPTX
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
PPTX
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
PPTX
Understanding Open Ports: Functions, Benefits, and Threats
PPTX
Comprehensive Website Port Scan: Functions, Benefits, and Security Threats
PPTX
Suddala-Scan: Enhancing Website Analysis with AI for Capstone Project at Bost...
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PPTX
Port Scanning: Unveiling the Hidden Doors of a Website
PPTX
Understanding Port Scanning: A Critical Tool in Web Security
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
Understanding Open Ports: Functions, Benefits, and Threats
Comprehensive Website Port Scan: Functions, Benefits, and Security Threats
Suddala-Scan: Enhancing Website Analysis with AI for Capstone Project at Bost...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Port Scanning: Unveiling the Hidden Doors of a Website
Understanding Port Scanning: A Critical Tool in Web Security

Similar to Website Port Scanning: Functions, Benefits, and Security Threats (20)

PPTX
Website Scanning: Uncovering Vulnerabilities and Ensuring Cybersecurity
PPTX
Understanding Network Security and Vulnerability Assessment
PPTX
Scan Website Vulnerability - Project Presentation
PPTX
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
PDF
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
PPTX
How to dominate a country
DOCX
Contents namp
DOCX
Contents namp
PPTX
Network Penetration Testing
PPTX
Exploring Kali Linux Tools for Website Scanning via IP Address
PPTX
Using metasploit
PPTX
DOCX
Assessment Questions and Answers1. What are the diff.docx
PPTX
Preso fcul
PPTX
Cybersecurity and Ethical Hacking: Capstone Project
PPTX
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
PPTX
Null Delhi chapter - Feb 2019
PPTX
Recon with Nmap
PPT
Nomura UCCSC 2009
PPTX
Network scanning
Website Scanning: Uncovering Vulnerabilities and Ensuring Cybersecurity
Understanding Network Security and Vulnerability Assessment
Scan Website Vulnerability - Project Presentation
Website Port Scanning: Functions, Benefits, and Threats of Open Ports
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
How to dominate a country
Contents namp
Contents namp
Network Penetration Testing
Exploring Kali Linux Tools for Website Scanning via IP Address
Using metasploit
Assessment Questions and Answers1. What are the diff.docx
Preso fcul
Cybersecurity and Ethical Hacking: Capstone Project
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
Null Delhi chapter - Feb 2019
Recon with Nmap
Nomura UCCSC 2009
Network scanning
Ad

More from Boston Institute of Analytics (20)

PPTX
"Predicting Employee Retention: A Data-Driven Approach to Enhancing Workforce...
PPTX
"Ecommerce Customer Segmentation & Prediction: Enhancing Business Strategies ...
PPTX
Music Recommendation System: A Data Science Project for Personalized Listenin...
PPTX
Mental Wellness Analyzer: Leveraging Data for Better Mental Health Insights -...
PPTX
Fraud Detection in Cybersecurity: Advanced Techniques for Safeguarding Digita...
PPTX
Enhancing Brand Presence Through Social Media Marketing: A Strategic Approach...
PPTX
Employee Retention Prediction: Leveraging Data for Workforce Stability
PPTX
Predicting Movie Success: Unveiling Box Office Potential with Data Analytics
PPTX
Financial Fraud Detection: Identifying and Preventing Financial Fraud
PPTX
Smart Driver Alert: Predictive Fatigue Detection Technology
PPTX
Smart Driver Alert: Predictive Fatigue Detection Technology
PPTX
E-Commerce Customer Segmentation and Prediction: Unlocking Insights for Smart...
PPTX
Predictive Maintenance: Revolutionizing Vehicle Care with Demographic and Sen...
PPTX
Smart Driver Alert: Revolutionizing Road Safety with Predictive Fatigue Detec...
PDF
Water Potability Prediction: Ensuring Safe and Clean Water
PDF
Developing a Training Program for Employee Skill Enhancement
PPTX
Designing a Simple Python Tool for Website Vulnerability Scanning
PPTX
Building a Simple Python-Based Website Vulnerability Scanner
PPTX
Fraud Detection: Harnessing Data Science for Securing Transactions
PPTX
Tools and Methods for Reconnaissance in Cybersecurity
"Predicting Employee Retention: A Data-Driven Approach to Enhancing Workforce...
"Ecommerce Customer Segmentation & Prediction: Enhancing Business Strategies ...
Music Recommendation System: A Data Science Project for Personalized Listenin...
Mental Wellness Analyzer: Leveraging Data for Better Mental Health Insights -...
Fraud Detection in Cybersecurity: Advanced Techniques for Safeguarding Digita...
Enhancing Brand Presence Through Social Media Marketing: A Strategic Approach...
Employee Retention Prediction: Leveraging Data for Workforce Stability
Predicting Movie Success: Unveiling Box Office Potential with Data Analytics
Financial Fraud Detection: Identifying and Preventing Financial Fraud
Smart Driver Alert: Predictive Fatigue Detection Technology
Smart Driver Alert: Predictive Fatigue Detection Technology
E-Commerce Customer Segmentation and Prediction: Unlocking Insights for Smart...
Predictive Maintenance: Revolutionizing Vehicle Care with Demographic and Sen...
Smart Driver Alert: Revolutionizing Road Safety with Predictive Fatigue Detec...
Water Potability Prediction: Ensuring Safe and Clean Water
Developing a Training Program for Employee Skill Enhancement
Designing a Simple Python Tool for Website Vulnerability Scanning
Building a Simple Python-Based Website Vulnerability Scanner
Fraud Detection: Harnessing Data Science for Securing Transactions
Tools and Methods for Reconnaissance in Cybersecurity
Ad

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Lesson notes of climatology university.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Complications of Minimal Access Surgery at WLH
PDF
01-Introduction-to-Information-Management.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Microbial diseases, their pathogenesis and prophylaxis
Lesson notes of climatology university.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Microbial disease of the cardiovascular and lymphatic systems
Supply Chain Operations Speaking Notes -ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Complications of Minimal Access Surgery at WLH
01-Introduction-to-Information-Management.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Computing-Curriculum for Schools in Ghana
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Website Port Scanning: Functions, Benefits, and Security Threats

  • 1. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Scan a website and find out what open ports are actively running and what are the functions, benefits and threats of such ports being opened Name: Bidgar Gaurav Dada Batch : June 2024
  • 2. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Agenda • Introduction to Scan a website and find out what open ports are actively running and what are the functions, benefits and threats of such ports being opened using the tools • Tool utilized to scan a website • What are open ports • Scanning a website using Nmap for open ports • Functions, Benefits and Threats of open ports • Mitigation
  • 3. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Introduction : • The purpose of this project is to scan the website "JadeBlue" for open ports and analyze their functions, benefits, and potential threats. Open ports are a crucial part of any networked system, and understanding them helps in both ensuring the security of the system and optimizing its performance. • For this project, tools such as Nmap will be used to perform the scan. Once open ports are identified, the functions of those ports will be analyzed, including their standard use cases. We will also assess the security implications of having these ports open.
  • 4. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Tool utilized to scan a website • Nmap(Network Mapper):  Nmap is short for Network Mapper. It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to detect installed applications. Nmap allows network admins to find which devices are running on their network, discover open ports and services, and detect vulnerabilities.
  • 5. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. What are open ports? • Open ports identify network endpoints that allow data exchange between devices. • Ports facilitate various internet services and applications, allowing them to function properly. While open ports themselves do not threaten your network’s security, they can be abused by hackers. So, open ports must be properly maintained to reduce the number of entry points for malicious actors
  • 6. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Scanning a website using Kali Linux and Nmap for open ports • Kali Linux is a popular operating system for cybersecurity professionals, and it comes pre-installed with Nmap. • Using Kali Linux and Nmap to find open ports • Step 1: Open Kali Linux Terminal Launch the terminal on Kali Linux. You can usually find it in the applications menu or by using the shortcut Ctrl + Alt + T.
  • 7. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Scanning a website using Kali Linux and Nmap for open ports • Step 2: Run Nmap Command • In this project, we will scan hostname/website “JadeBlue.com” as a target to find open ports. It’s a shopping website. URL: "https://www.jadeblue.com/" • Use the following command into the terminal, replacing [target] with the IP address or hostname of the target nmap [target]
  • 8. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Scanning a website using Kali Linux and Nmap for open ports • Step 3: Wait for Scan to Complete • Nmap will start scanning the target for open ports. This process may take some time depending on the size of the network and the scan options used.
  • 9. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Scanning a website using Kali Linux and Nmap for open ports • Step 4: Review Scan Results • Once the scan is complete, Nmap will display a list of open ports on the target device or network. Analyze these results to understand which services are running and potential security risks.
  • 10. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Open ports which are actively running • In this Nmap scan, we found ten open ports which are actively running. 25/tcp (SMTP) – Simple Mail Transfer Protocol 80/tcp (HTTP) – Hypertext Transfer Protocol 110/tcp (POP3) – Post Office Protocol 3 143/tcp (IMAP) – Internet Message Access Protocol 443/tcp (HTTPS) – Hypertext Transfer Protocol Secure 587/tcp (Submission) – Email Message Submission 993/tcp (IMAPS) – IMAP Secure 995/tcp (POP3S) – POP3 Secure 8080/tcp (HTTP-PROXY)
  • 11. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Analysis of Open Ports: Port Service Name Function Benefits Threats 25/tcp SMTP Used for sending emails. Enables email functionality for the server. Can be used for spam distribution, vulnerable to relay attacks, and DDoS attacks. 80/tcp HTTP Standard protocol for web traffic. Allows users to access the website without encryption. Vulnerable to MITM attacks, Cross-Site Scripting (XSS), and SQL injection. 110/tcp POP3 Protocol for retrieving emails from the server. Commonly used for email retrieval by clients. Unencrypted data transfer, susceptible to eavesdropping and phishing. 143/tcp IMAP Allows email clients to access email messages. Provides more advanced features like folder management. Vulnerable to sniffing attacks if not encrypted, and email account hijacking. 443/tcp HTTPS Secure version of HTTP using SSL/TLS encryption. Provides secure communication between the user and the server. Can be vulnerable if SSL/TLS misconfigured or weak certificates used.
  • 12. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. port Services Functions Benefits. Threats 587/tcp Submission Used by email clients to send emails securely (SMTP over TLS). Secure way to send emails, protects user credentials. Potential misconfiguration, but more secure than SMTP on port 25. 993/top IMAPS Secure IMAP over SSL/TLS. Provides secure email access with encryption, preventing eavesdropping. Can still be vulnerable to weak encryption protocols or improper certificate management. 995/tcp POP3S Secure POP3 over SSL/TLS. Provides secure email retrieval with encryption. Similar threats as IMAPS, especially if outdated SSL/TLS protocols are used. 8080/tcp HTTP-Proxy Alternative HTTP port, often used for proxies or admin panels. Useful for proxy servers or alternate HTTP services. Common target for exploits, often misconfigured, and can expose admin panels.
  • 13. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Mitigation • Shut down any ports that are not necessary for your system’s operation. • Configure a firewall to block unauthorized access to open ports. • Regularly update your system and applications to patch any known vulnerabilities • Implement access controls to restrict who can connect to open ports • Conduct periodic security assessments to identify and address any vulnerabilities associated with open ports.
  • 14. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Questions ?
  • 15. CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Thank You!