Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 38, 2008 - Issue 5
38
Views
0
CrossRef citations to date
0
Altmetric
Miscellany

The Role of Auditors in Network Security (Shooting Fish in a Barrel)

Pages 1-6 | Published online: 20 Jan 2009
 

Abstract

Notes

1. A port is a “logical connection place” and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network. Port numbers are from 0 to 65536. Ports 0 to 1024 are reserved for use by certain privileged services (i.e., HTTP uses port 80).

2. Exploit code is software program or sequence of commands that take advantage of a bug, glitch, or software weaknesses to cause unintended behavior in a computer application. This frequently includes such things as gaining control of a computer system or a denial of service attack.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.