Common Used Ports
Security Controls
Phishing
Impersonation
Troubleshoothing Hardware
100

This port is used for secure web traffic over HTTPS.

Port 443

100

This type of control includes policies, procedures, and training designed to influence human behavior and reduce risk.

Administrative Control
100

This broad social engineering attack tricks users into giving up information, often through fake emails or messages.

Phishing

100

An attacker pretends to be a trusted individual—like IT support or a manager—to trick someone into giving up access or information.

social engineering impersonation

100

A computer won’t power on, and no lights or fans turn on. This is the first component you should check.

Power Supply

200

This port is used for unencrypted web browsing over HTTP.

Port 80

200

This control type physically prevents or deters unauthorized access, such as locks, fences, or security guards.

Physical Control

200

This type of phishing targets high‑value individuals like executives, administrators, or public figures.

Whaling

200

An attacker pretends to be a coworker or supervisor to pressure an employee into sharing information.

Pretexting

200

A user reports their screen is completely black, but the computer is running. This cable is the most common culprit.

display/video cable

300

This port is used by SSH for secure remote administration and encrypted terminal sessions.

Port 22

300

This category of controls includes firewalls, encryption, and intrusion detection systems that protect systems and data.

Technical Controls

300

This phishing variant uses text messages or mobile alerts to trick victims into clicking malicious links.

Smishing

300

An attacker calls the help desk pretending to be a locked‑out employee and asks for a password reset.

help‑desk impersonation

300

A system keeps randomly rebooting during heavy workloads. Overheating is the likely cause, so you check this component first.

CPU fan or cooling system

400

This port is used by DNS for standard name resolution queries over UDP.

Port 53

400

This type of administrative control is designed to discourage security violations before they occur, often using policies, warnings, or posted signage.

Deterrent Control

400

This highly targeted phishing attack uses personal details about the victim to appear more convincing.

Spear Phishing

400

An attacker dresses as a delivery driver or maintenance worker to gain physical access to a restricted area.

impersonating a trusted third party

400

A computer boots but constantly freezes or shows the “blue screen.” Faulty or improperly seated modules in this component are often to blame.

RAM

500

This port is used by RDP to remotely access and manage Windows systems.

Port 3389

500

This advanced technical control type is used when the primary control cannot be implemented, providing an alternative safeguard that still meets the security requirement.

Compensating Control

500

This advanced phishing technique manipulates DNS or website appearance to redirect users to a fake login page that looks identical to the real one.

Pharming

500

An attacker uses stolen credentials and mimics a legitimate user’s behavior to avoid detection while accessing systems.

Account impersonation or identity spoofing

500

A system is extremely slow to start, frequently crashes, and makes clicking noises. This hardware component is likely failing.

Hard Drive