Preview

Sec 280 Week 1

Good Essays
Open Document
Open Document
667 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sec 280 Week 1
Week 1 Report
Class SEC 280
In today’s report I will give a basic definition of and explain to the best of my ability what port scanning is and also what a ping sweep is and I will also try to provide examples of these techniques. Lastly I will show how these simple this can be done and or avoided and how they can affect us as a company.
In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.
To begin one of the most basic types of possible threats can come from what is called an IP sweep. What an IP sweep basically is a broad area ping that allows the user to determine what hosts if any exist on a network given a certain IP address range. A normal ping consists of a single hello message from one computer to the receiving computer. A ping sweep pings any and all computer to determine which are alive so that the attacker can figure out where he can attack the network.
The next technique that can be used is called a port scanner, what a port scanner does is looks for any and all ports that can be accessed to put it in simple terms it is looking for any open routes (or doorways) into the computer or network it is scanning. Port scanning by itself can and is a useful tool; essentially, a port scan consists of sending a message to each port, one at a time. The response the person doing the scanning gets indicates whether the port is being used or not and from there the attacker can research the port for weakness. Typical ports scans can show up in system logs and thus



References: Ping Sweeping/Port Scanning Information http://www.linuxjournal.com/article/4234 How Port scanning works http://lifehacker.com/198946/how-to-portscan-your-computer-for-security-holes

You May Also Find These Documents Helpful

  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Regarding your recent request about more information on ping sweeps and port scans, I am going to provide you with some information to help you with any confusing that you may have. Port scans and ping sweeps are networking tools that admins use to perform normal and common functions such as, checking server to see if it is running correct or to determine with services are open so they can receive important updates. Hackers use the same function which can provide a hacker with information.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Large numbers of packets caught by your router or firewall's egress filters. Recall that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network has been compromised. Unscheduled reboots of server machines may sometimes indicate their compromise. You should be already be watching the event logs of your servers for failed logons and other security-related events.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this assignment, you will explain the purpose of port scanning and choose port scanning software to increase server security.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I would recommend him using Nmap. Nmap is the most popular port scanner. Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    According to S. Branch (2012), in his article What is a Ping Sweep he says “A ping sweep, also called an Internet Control Message Protocol (ICMP) sweep, is a diagnostic technique used in computing to see what range of (IP) addresses are in use by live host, which are usually computers”. Ping sweeps are not unusual, they are often used by administrators in diagnosing network issues; however, hackers also use ping sweeps to find active computers so they will know where to concentrate their attacks. This can become a serious security breach for an unprepared network. Hackers send not one ping but many packets at the same time. This tends to slow down a network. When the hackers ping sweep finds an active computer it can send request for confidential information.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    packet analyzer, and the Wireshark protocol capture and analyzer tool. You opened Telnet and SSH sessions…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Also large numbers of packets caught by your router or firewall's egress filters. Remember that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Port Scans are usually used after a Ping screen has been successful finding a computer that is on. If a “Hacker” is using this device, they are trying to get access to the system to steal or harm the system in some way. Network administrators also use a Port Scan to see what ports are open on which computers to see if there is a security risk within their systems. IP companies will access a port that is open to see if they there is a good internet connection with their internet service.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Better Essays

    An active attack involves attempts to break through protection features such as a firewall. This can be done through stealth, viruses, worms or Trojan horses. Active attacks involve the introduction of malicious code and to steal or modify information. These attacks are…

    • 983 Words
    • 3 Pages
    Better Essays

Related Topics