Page 32 - Cyber Defense eMagazine - December 2017
P. 32

those procedures and policies because they should always be improved and that’s way
               we would believe they got the quite good and not the best ones.


                                                                        Some  researchers  would  suggest

                                                                        that  we  should  try  to  avoid  the
                                                                        hacker’s  tools  getting  remotely

                                                                        connected  to  our  devices.  The

                                                                        recommended  way  to  do  so  is  to
                                                                        set up your Firewall – either being

                                                                        software  or  hardware  by  its
                                                                        configuration.      Through       our

                                                                        research,  we  would  find  some
                                                                        sources  that  would  claim  we

                                                                        should  follow  the  quite  good

               practice  of  disabling  the  inbound  connections  within  our  Firewall  protection.  In  other
               words,  those  researches  would  indicate  that  most  of  publicly  available  hacking  tools

               would use our inbound ports in order to obtain the access to our devices. If we block

               those connections – we could reduce the risk from being hacked. In addition, we would
               get  the  information  that  the  entire  web  traffic  could  get  transferred  from  inbound  to

               outbound  ports  and  if  we  do  so  –  we  should  count  on  less  threatening  network’s
               communications. On the other hand, if you use some messenger tool for – let’s say –

               chatting  purposes  –  you  should  define  its  inbound  port  being  opened  because  in
               opposite – your messenger would not work at all. Well, let’s say that we have defined

               some inbound port for the messenger communications and we have assured that we

               could take advantage over that tool. In such a case, the hackers could try to exploit that
               vulnerability  attempting  to  access  your  computer  and  the  entire  network  through  that

               port. Finally, you would agree that configuring the network’s traffic is the quite trickery
               job and it seeks a lot of knowledge to get obtained.


               One more suggestion we could make regarding the secure network’s traffic is that we

               should try to get the difference between public and private IP address. The private IP
               address is the IP address that would belong to your physical device, while the public IP



                   32    Cyber Defense eMagazine – December 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   27   28   29   30   31   32   33   34   35   36   37