Preview

Unit 3 Assignment 1 - Choosing Port Scanning Software

Satisfactory Essays
Open Document
Open Document
443 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 1 - Choosing Port Scanning Software
Unit 3 Assignment 1 – Choosing Port Scanning Software
1. The act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.(1)
2. To determine services that a computer is running and shut down services not being used to increase the security of the computer being scanned.(2)
3. I would prefer open source port scanning software. Here are the reasons why:
Lower cost: Since development is done by a community of volunteers (many of whom are paid by other organizations), the costs don’t need to cover a company’s development expenses.
Customization: Open source software is designed for developers to adapt and extend. Whereas, users usually cannot make non-cosmetic changes to a proprietary system.
Nimble: Open source projects adopt new trends faster than proprietary systems.
Openness: Open Source systems are usually designed with integration in mind; whereas commercial systems have business motivations to lock organizations into a closed system.
Fast bug and security fixes: Open source software usually has many people combing its source code, who rapidly fix problems as they are discovered.(3)
4. I would recommend him using Nmap. Nmap is the most popular port scanner. Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Expander installed and now be able to accommodate 6 devices, but at a max of 3Gbit/s throughput…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is a policy definition of it. IT is a free program that can be downloaded but donations are accepted. IT is also an open source program so people are constantly improving it.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans and Ping sweeps are something that everyone should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to block unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be risky for your computer. It is highly…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computers systems are an essential piece of equipment in many people’s everyday lives they have to deal with a lot of processes information and be able to go on the internet where there is a risk of getting viruses and bugs. This is why computer systems have to be equipped with the right software utilities to ensure that they are working at their best at all times. There are many different types of software utilities available for a computer system I will explain them in detail in this report.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CMGT 555 Week 5 DQs

    • 422 Words
    • 3 Pages

    This work of CMGT 555 Week 5 Discussion Questions shows the solutions to the following problems: DQ 1: Identify advantages and risks associated with open source software.…

    • 422 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A port scan attack is a popular reconnaissance technique that attackers use to discover services they can break into according to Yahoo Answers (2007), Author unknown. Yahoo Answers states that “All…

    • 703 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    linux unit1 assignment1

    • 825 Words
    • 3 Pages

    Answer: Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing.…

    • 825 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    IT542 Assignment Unit1 1

    • 421 Words
    • 3 Pages

    a. This screenshot demonstrate that the only port left open is the remote desktop port tcp 3389. All other open ports are been removed from Window 2003.…

    • 421 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Study Guide

    • 2229 Words
    • 8 Pages

    Which of the following is a difference between security vulnerabilities associated with open sources software and proprietary…

    • 2229 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Port scans are a animal that takes ping sweeps to the next level. The goal of a port scan is to actually see a machine on the network by probing for machines. Of course, the machine must be powered on for the port scan to find it. When it does find a…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    a. Closing off unused ports via a firewall to reduce the chance of unwanted network access…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    Specifications for hardware or software that are developed by a standards organization or a consortium involved in supporting a standard. Available to the public for developing compliant products, open standards imply "open systems;" that an existing component in a system can be replaced with that of another vendor. Although many vendors may have contributed to an open standard, and one may have contributed more than others and even have great influence, an open standard is not completely controlled by a single vendor.…

    • 544 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 assignment 1

    • 405 Words
    • 2 Pages

    Three main characteristics of free software are: When you distribute the source code, you must also distribute same license with the code, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing.…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 1

    • 641 Words
    • 2 Pages

    Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing.…

    • 641 Words
    • 2 Pages
    Good Essays