Preview

IS3220 Project Network Survey Chris Wig

Powerful Essays
Open Document
Open Document
1578 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3220 Project Network Survey Chris Wig
IS3220 Project Network Survey
Chris Wiginton, Jose Rosado
ITT Technical Institute, Tampa FL
Instructor: Sherman Moody
10 October, 2014

Besides the basic physical security of a site, the next most important aspect is controlling digital access into and out of the organization’s network. In most cases this means controlling the points of connectivity to the outside world, typically the Internet. Partitioning the boundary between the outside Internet and the internal intranet is a critical security piece. Any services not actually needed should be turned off so that they will not become avenues of attack for security threats. Different systems will have different services running by default. The firewall process can tightly control what is allowed to traverse from one side to the other. As with most aspects of security, deciding what type of firewall to use will depend upon factors such as traffic levels, services needing protection and the complexity of rules required. The difficulty for firewalls is distinguishing between legitimate and illegitimate traffic. Firewalls, if configured correctly, can be a reasonable form of protection from external threats including some denial of service (DOS) attacks. If not configured correctly they can be major security holes in an organization. The most basic protection a firewall provides is the ability to block network traffic to certain destinations. This includes both IP addresses and particular network service ports. Many network devices and computer hosts startup network services by default, each of these services could represent an opportunity for attackers, worms and Trojans. Very often all of these default services are not needed. Doing port lockdown by turning off services reduces this exposure. A port scan of Corporation Tech’s network provided the results listed in the table below.

PORT
PROTOCOL
STATE
SERVICE
25
TCP
CLOSED
SMTP
80
TCP
OPEN
TCP Wrapped
139
TCP
OPEN
netbios-ssn
1900
TCP
OPEN
TCP



References: Gibson, S. (n.d.). GRC | Port Authority, for Internet Port 139  . Retrieved October 10, 2014, from https://www.grc.com/port_139.htm Gibson, S Gibson, S. (n.d.). GRC | Port Authority, for Internet Port 80  . Retrieved October 10, 2014, from https://www.grc.com/port_80.htm Gibson, S Network Printer Ports. (2003, March 28). Retrieved October 10, 2014, from http://technet.microsoft.com/en-us/library/cc728404(v=ws.10).aspx networking - Is port 139 still vulnerable? - Server Fault Port 5357 TCP on Windows 7 professional 64 bit? - Super User. (2009, October 18). Retrieved October 10, 2014, from http://superuser.com/questions/56781/port-5357-tcp-on-windows-7-professional-64-bit Port 62078 (tcp/udp) :: SpeedGuide.net Port 6839 (tcp/udp) - Online TCP UDP port finder - adminsub.net. (2014, August 26). Retrieved October 10, 2014, from http://www.adminsubnet.net/tcp-udp-port-finder/6839 Port 7435 (tcp/udp) - Online TCP UDP port finder - adminsub.net Port 9110 (tcp/udp) :: SpeedGuide.net. (n.d.). Retrieved October 10, 2014, from http://www.speedguide.net/port.php?port=9110 TCP 9500 - Port Protocol Information and Warning! (n.d.) Vaughan-Nichols, S. (2013, January 30). How to fix the UPnP security holes | ZDNet. Retrieved from http://www.zdnet.com/how-to-fix-the-upnp-security-holes-7000010584/ Wilson, C

You May Also Find These Documents Helpful

  • Satisfactory Essays

    With a DMZ, there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    What Field in the TCP header contains a well known port number that maps to the Application that will handle the segment Data Stream?…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    nt1230

    • 905 Words
    • 6 Pages

    Why can you not simply leave Windows Firewall turned off when you deploy an actual web server?…

    • 905 Words
    • 6 Pages
    Good Essays
  • Good Essays

    A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This indicates the service uses a TCPwrapper. This is a host based network in ACL system used to filter Internet Server Protocols provides firewall features.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    5. What is the destination port for the DNS query message? What is the source port…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    6. The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe…

    • 440 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweeps and Port scans are a great security tool for businesses. Ping sweeps are used to find someone on the end of a network and Port scans are then used to find a way into that end of the network. Once a perpetrator gets in there is no telling what harm could be done. These techniques can also be used for troubleshooting issues that can arise inside the company. It is in the company’s best interest to be aware of ping sweeps and port scans to help from devastating consequences later on.…

    • 434 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ping Sweeps

    • 685 Words
    • 3 Pages

    Port scanning is one of the most popular techniques attackers use to discover services they can break into. All machines connected to a Local Area Network or Internet run many services that listen at well-known and not so well known ports. A port scan helps the attacker find which ports are available. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. Typical ports scans can show up in system logs. A…

    • 685 Words
    • 3 Pages
    Good Essays
  • Good Essays

    CN ASS 3

    • 867 Words
    • 7 Pages

    Python, how to create a socket, bind it to a specific address and port, as well…

    • 867 Words
    • 7 Pages
    Good Essays
  • Best Essays

    Deering, S., Hinden, R. (1998). Internet Protocol, Version 6 (IPv6) Specification. RFC 2460. Retrieved from: http://tools.ietf.org/html/rfc2460…

    • 2617 Words
    • 11 Pages
    Best Essays