Preview

IS3220 Identify Services and Their Uses

Good Essays
Open Document
Open Document
438 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3220 Identify Services and Their Uses
Scan Analysis
After reviewing the port scan results for the indicated hosts, one can readily see that some of these services must be disabled. Authentication services are necessary, I recommend configuring the system to pass or allow this service. The three services I know to be unnecessary, based on our network topology are the Secure Shell (SSH), Microsoft Remote Procedure Call (MSRPC), File Transfer Protocol (FTP). Simple Mail Transfer Protocol (SMTP) is essential to email communications in a Windows network, this service allows users within the network to send and receive emails. We do not allow remote users at this time, due to this MSRPC should be disabled, this protocol was heavily used in Windows 2000 environments, but is now highly vulnerable, and most networks have it disabled.
Identify Services & Their Uses
Domain
This is the website, or web domain being utilized.
HTTP
The protocol being used during web browsing. The HTTP Service is a kernel mode driver. Upon service failure, the error is logged. Windows 8 startup proceeds, but a message box is displayed informing you that the HTTP service has failed to start.
SSH
Is an encryption protocol for remote users during shell sessions.
AUTH
This is the authentication service.
TCPwrapped
This indicates the service uses a TCPwrapper. This is a host based network in ACL system used to filter Internet Server Protocols provides firewall features.
MSRPC
This is used by Microsoft to seamlessly create a client/server model in Windows NT, with very little effort.
SMTP
Simple Mail Transfer Protocol. This is used to send and receive email messages between clients.
NETBIOS-SSN
This is a session service protocol used for file and printer sharing.
Microsoft-DS
MS-DS is a port used ever since Windows 2000 was introduced. It is used for file sharing.
Unknown
This occurs when a scanner scans itself, disregard.
FTP
File Transfer Protocol. This is the main protocol, or service that is utilized during file transferring between

You May Also Find These Documents Helpful

  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    Web Server - Apache Web Filtering - DansGuardian Network Firewall - Turtle Firewall VPN - Endian Firewall Community IDS/IPS - Suricata Database - MySQL File Server - Samba SMTP Server - hMailServer…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 20 lab

    • 284 Words
    • 2 Pages

    6. Describe the software and protocols used when Max sends an email to Sam on a remote Linux system.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Protocol: A set of rules that different devices and/or software must follow so that the network works correctly.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    This network access control determines which IP packets are allowed entry to a network and which are dropped.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz 2docx

    • 1029 Words
    • 13 Pages

    _____ is a set of standards for exchanging messages containing formatted data between computer applications.…

    • 1029 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    May refer only to the access method in a LAN, such as Ethernet or Token Ring…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for receiving packet loss information from clients and providing synchronization information to clients that are streaming by using RTSPU.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Message sent – individual sends the message i.e speaking or sign what they want to communicate.…

    • 973 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT1210 Unit 2

    • 443 Words
    • 2 Pages

    11. Protocol -A set of rules that different devices and/or software must follow so that the network works correctly.…

    • 443 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It is an Internet protocol that e mail and other programs use to look up information from a server. It is not limited to contact information or information about people. It is appropriate for any kind of directory like information where fast look-ups and less frequent updates exist.…

    • 2626 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    service package

    • 1419 Words
    • 6 Pages

    Before describing about the service package of MITSOB I would like to give an overview of what SERVICE is ..…

    • 1419 Words
    • 6 Pages
    Good Essays