Enterprise Considerations for Ports and Protocols

October, 2016
IDA document: D-8011
FFRDC: Systems and Analyses Center
Division: Information Technology and Systems Division
Authors:
Authors
William R. Simpson, Kevin E. Foltz See more authors
The need to control information flow to a restricted set of accepted protocols arises from the vulnerabilities that may come from any protocol.