Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers

Barry Greene @ bgreene@senki.or Version 1.3 TLP: CLEAR  What are you doing to prepare for the next “scanning malware” and “Internet Worm?” Recommendation: Operators (CSPs, ISPs, Cloud Companies, and Hosting Companies) are strongly encouraged to deploy Port Filtering on the known Exploitable ports and Source Address Validation (SAV) on their customer edge of the network