Open Ports = Open Doors
Think Like the Attacker
Packet Pathways
Incident Response
Lock It Down
100

This port is used for HTTP web traffic.

What is port 80?

100

An attacker sends a fake email to trick a user into revealing credentials.

What is phishing?

100

This device forwards packets between different networks.

What is a router?

100

This is the first step in incident response, involving preparation and planning.

What is preparation?

100

This part of AAA is what requires a password or PIN.

What is authentication?

200

This secure version of HTTP typically runs on this port.

What is port 443?

200

This type of attack floods a server with traffic to make it unavailable.

What is a DDoS attack?

200

This protocol is responsible for delivering packets to the correct IP address.

What is IP (Internet Protocol)?

200

This phase involves identifying whether a security event is actually an incident.

What is detection (or identification)?

200

This tool filters incoming and outgoing network traffic based on rules.

What is a firewall?

300

This protocol uses port 22 and allows secure remote login.

What is SSH?

300

An attacker tries many password combinations quickly to gain access.

What is a brute-force attack?

300

This protocol ensures reliable delivery of data with error checking.

What is TCP?

300

This step focuses on limiting the damage of an attack while it is happening.

What is containment?

300

This security principle gives users only the access they absolutely need.

What is least privilege?

400

This port is commonly targeted for brute-force attacks due to remote desktop access.

What is port 3389?

400

This attack tricks users into visiting a fake website that looks legitimate.

What is a watering hole?

400

This device operates at Layer 2 and uses MAC addresses to forward frames.

What is a switch?

400

This phase involves removing the threat from the system.

What is eradication?

400

This method adds an extra verification step beyond a password.

What is multi-factor authentication (MFA)?

500

This protocol uses port 21 and is considered insecure because it sends data in plaintext.

What is FTP?

500

An attacker intercepts communication between two parties without them knowing.

What is a Man-in-the-Middle (MITM) attack?

500

This process breaks data into smaller units for transmission across a network.

What is packet segmentation?

500

This final phase focuses on restoring systems and reviewing the incident.

What is recovery (or lessons learned)?  

500

This system monitors networks for suspicious activity and alerts administrators.

What is an Intrusion Detection System (IDS)?