What are some best practices for avoiding port scanning?
The simplest thing you can do to protect yourself from port scan attacks or reconnaissance attacks is to use a good firewall and intrusion prevention system (IPS). It's not possible to protect against all such attacks -- after all, if you're running a Web server, port 80 is obviously going to be visible to the world -- but, this approach will limit an organization's exposure.
The firewall strictly controls which ports are exposed and to whom they are visible, limiting the attack surface discoverable with a port scan. The IPS will detect port scans in progress and shut them down before they are able to gain a full map of your network.
Dig deeper on Network Intrusion Prevention (IPS)
Related Q&A from Mike Chapple, Enterprise Compliance
Should companies obtain U.S. security clearance to join the Enhanced Cybersecurity Services program? Mike Chapple offers his perspective.continue reading
Does a Web application security assessment termed 'compliance ready' seem too good to be true? Learn its role in an enterprise compliance program.continue reading
Learn how hiring the right PCI DSS-compliant service providers, especially payment services providers, can reduce your compliance burden.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.