| * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…
For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…
2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…
8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?…
3. Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems.…
During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…
After reviewing the port scan results for the indicated hosts, one can readily see that some of these services must be disabled. Authentication services are necessary, I recommend configuring the system to pass or allow this service. The three services I know to be unnecessary, based on our network topology are the Secure Shell (SSH), Microsoft Remote Procedure Call (MSRPC), File Transfer Protocol (FTP). Simple Mail Transfer Protocol (SMTP) is essential to email communications in a Windows network, this service allows users within the network to send and receive emails. We do not allow remote users at this time, due to this MSRPC should be disabled, this protocol was heavily used in Windows 2000 environments, but is now highly vulnerable, and most networks have it disabled.…
For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…
Monitoring traffic will help for see intrusions into the network. Any traffic that is out of the ordinary will…
i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…
Port scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.…
Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…
Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts…
Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…
Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…