The ports associated with an application or service may be changed. For example, the port for service A may change from port 75 to port 80. In another embodiment, the SCS computer device 100 may use port A for negotiating for connections, while the connections may be set-up on a different port. Furthermore, multiple connections from different client systems may also connect to different ports, which are determined during the negotiation for connection. In addition, the SCS computer system 100 may change the connection port after a predetermined period of time. In some embodiments, the SCS computer system 100 spoofs the responses to ports being scanned. In these embodiments, the SCS computer system 100 responds with an ACK to all messages for one or more ports. This simulates the port being open, but then does not allow communications, such as authentication requests to do anything.
The security protocol includes changing the type of encryption for the VPN connection or other communications. Changing the network device includes changing which wireless card or network card is being used by the SCS computer system 100.
In some embodiments, the SCS computer device 100 creates a new VPN connection every time the network connection is disabled 615 and restarted 625.