This port is used for secure web traffic over HTTPS.
Port 443
This type of control includes policies, procedures, and training designed to influence human behavior and reduce risk.
This broad social engineering attack tricks users into giving up information, often through fake emails or messages.
Phishing
An attacker pretends to be a trusted individual—like IT support or a manager—to trick someone into giving up access or information.
social engineering impersonation
A computer won’t power on, and no lights or fans turn on. This is the first component you should check.
Power Supply
This port is used for unencrypted web browsing over HTTP.
Port 80
This control type physically prevents or deters unauthorized access, such as locks, fences, or security guards.
Physical Control
This type of phishing targets high‑value individuals like executives, administrators, or public figures.
Whaling
An attacker pretends to be a coworker or supervisor to pressure an employee into sharing information.
Pretexting
A user reports their screen is completely black, but the computer is running. This cable is the most common culprit.
display/video cable
This port is used by SSH for secure remote administration and encrypted terminal sessions.
Port 22
This category of controls includes firewalls, encryption, and intrusion detection systems that protect systems and data.
Technical Controls
This phishing variant uses text messages or mobile alerts to trick victims into clicking malicious links.
Smishing
An attacker calls the help desk pretending to be a locked‑out employee and asks for a password reset.
help‑desk impersonation
A system keeps randomly rebooting during heavy workloads. Overheating is the likely cause, so you check this component first.
CPU fan or cooling system
This port is used by DNS for standard name resolution queries over UDP.
Port 53
This type of administrative control is designed to discourage security violations before they occur, often using policies, warnings, or posted signage.
Deterrent Control
This highly targeted phishing attack uses personal details about the victim to appear more convincing.
Spear Phishing
An attacker dresses as a delivery driver or maintenance worker to gain physical access to a restricted area.
impersonating a trusted third party
A computer boots but constantly freezes or shows the “blue screen.” Faulty or improperly seated modules in this component are often to blame.
RAM
This port is used by RDP to remotely access and manage Windows systems.
Port 3389
This advanced technical control type is used when the primary control cannot be implemented, providing an alternative safeguard that still meets the security requirement.
Compensating Control
This advanced phishing technique manipulates DNS or website appearance to redirect users to a fake login page that looks identical to the real one.
Pharming
An attacker uses stolen credentials and mimics a legitimate user’s behavior to avoid detection while accessing systems.
Account impersonation or identity spoofing
A system is extremely slow to start, frequently crashes, and makes clicking noises. This hardware component is likely failing.
Hard Drive