Publication | Closed Access
A study of open ports as security vulnerabilities in common user computers
13
Citations
4
References
2014
Year
Unknown Venue
EngineeringOpen PortsInformation SecuritySecurity VulnerabilitiesHardware SecurityTrusted Execution EnvironmentInternet Of ThingsHardware Security SolutionCommon User ComputersNetwork SecurityInternet SecurityNetworked Computer SystemsComputer EngineeringSecure By DesignFirewall (Computing)Computer ScienceDevice DriverCryptographySoftware SecurityInformation ExplosionTechnology
The unprecedented growth in information technology and information explosion, with more and more data in electronic forms has put the computer into the hands of users with very little technical knowledge. The fact that the systems are not inherently immune, and that open up a number of vulnerabilities, leading to potential attacks, and the most prominent is in the form of open ports. This paper attempts to do a survey on common user computing devices including start devices to discover open ports and thereby explore vulnerabilities that can lead to potential attack targets.
| Year | Citations | |
|---|---|---|
Page 1
Page 1