Preview

Sec 280 Week 1 Case Study

Satisfactory Essays
Open Document
Open Document
408 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sec 280 Week 1 Case Study
SEC 280
5-9-13
Week 1 Case Study

Regarding your recent request about more information on ping sweeps and port scans, I am going to provide you with some information to help you with any confusing that you may have. Port scans and ping sweeps are networking tools that admins use to perform normal and common functions such as, checking server to see if it is running correct or to determine with services are open so they can receive important updates. Hackers use the same function which can provide a hacker with information. Port scans, like I stated earlier, are used to discover what services are running on a certain machine. Each service offered by our servers makes user of ports by which TCP/IP requests are sent. Hackers use this information to determine what types of vulnerabilities they can use; this is why the only ports that are open are the ones that we are using. By keeping all other ports closed this keeps hackers from opening other unnecessary openings. Ping sweeps are often used in combination with Port scans, similar process. Ping sweeps are used to see what targets are available on the network. For instance, we may be on a 192.168.1.0 vlan with only a few computers. The router or DHCP server will assign each machine with its own IP address in order by request, by doing this the IP address can get out of order. A Ping sweep of the IP range 192.168.1.1 – 192.168.1.99 would show the computers are currently on the network. Hackers do this to gain as much access as possible. Port scans and Ping sweeps are something that everyone should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to block unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be risky for your computer. It is highly



References: http://gregorympyles.wordpress.com/information-systems/case-studies/ping-sweeps-and-port-scans/ http://www.linuxjournal.com/article/4234?page=0,0 Principles of Computers Security: Security + and Beyond, 2nd Edition

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Soc 341 Case Study

    • 158 Words
    • 1 Page

    CCIB Intake received SOC 341 from co-complainant for complaint control # 27-SC-20170104121605. The reporting party is Michelle Allie, RN Case Manager with Mercy Hospice 9912 Business Park Dr., Sacramento 95827 (916) 281-3900. The SOC 341 is regarding resident Shirley Pond. The reporting party (RP) stated the home health aide Ramona was preparing to leave when the caregiver Lidia stated "aren't you going to make the bed!" Ramona replied the resident stated she was tired and wanted to lie back down after her shower. Lidia then went into the resident's room where the resident was sitting on the side of her bed and in the presence of the RP and the home health aide, yelled "why did you tell the nurse not to make your bed?" She then told the resident…

    • 158 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. This is to notify you that your 12.7% Retention Incentive will be cancelled effective 1/21/2016. You have accepted a promotion to a Clinical Pharmacist position within the organization with an effective date of 1/22/2016.…

    • 130 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The keystone to what Henry Clay called the American System was A. encouraging British competition. B. a low tariff C. abolishing slavery. D. a high tariff.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    Applications that use the Internet can have weaknesses when it comes to updates. Usually vendors will release patches to address some of these weaknesses when they are discovered. For some reason the full patch is not installed this now makes the application vulnerable. When the user downloads a document, media file, or even just a HTML page on this un-patched system the system can be compromised. With this happening this can cause more malware to be downloaded making the overall system worse. With the IPS in place the patches with the vulnerable application can be scanned by network traffic for patterns with the IPS it will help you will data about the network on a regular basis to see what is going on. With the IPS in place we will have the control to set it up with all the policy’s that are needed to help fight against any…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    #1.) After reviewing the information in this case study, you find that Parris’ husband, Lavar, was not listening when Parris first told him to pick their daughter up from school. Explain how Lavar and Parris should use effective empathic listening and responding skills to discuss this issue.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Although The main purpose of port scanning is to find out as much information as you can on the target in order to see if there are any known vulnerabilities, port scanning has legitimate uses in managing networks, port scanning can be malicious in nature if someone is looking for a weakened access point to break into your computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Weekly tasks or assignments (Individual or Group Projects) will be due by Monday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time.…

    • 272 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    What are the major security threats on my network and computers connected to the network?…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 310 Entire Course

    • 402 Words
    • 2 Pages

    In this document of SEC 310 Entire Course you will find the next files: SEC 310 Week 1 DQs.doc…

    • 402 Words
    • 2 Pages
    Satisfactory Essays