Preview

UNIT 3 ASSIGNMENT 1: CHOOSING PORT SCANNING SOFTWARE

Satisfactory Essays
Open Document
Open Document
281 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
UNIT 3 ASSIGNMENT 1: CHOOSING PORT SCANNING SOFTWARE
In this assignment, you will explain the purpose of port scanning and choose port scanning software to increase server security.
1. What is port scanning?
Port scanner is the software program created and designed to probe a server or host for open ports. This is often run and used by administrators to acknowledge security policies of their networks and for attackers to identify running services on a host with the view to compromise it.
2. What is the goal of port scanning?
Purpose of port scanning is to discover as much information as you can on the target in order to find out if there's are known vulnerabilities or openings in the targets network.
3. Would you prefer an open source or proprietary port scanning software?
I definitely prefer Open Source. It’s easier to fix and debug open source rather than the proprietary software. In open source, bugs are usually submitted to an online issue tracking system, which is public to any user. For efficient and simple everyday support issues and errors there is not an extreme difference between open source support and proprietary software support.
4. What port scanning software would you recommend to your Senior Administrator? Explain why.
Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

You May Also Find These Documents Helpful

  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is a policy definition of it. IT is a free program that can be downloaded but donations are accepted. IT is also an open source program so people are constantly improving it.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    3. Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Open source. It’s actually easier to deal with a bug fix for open source than it is for proprietary software. In open source, bugs are typically submitted to an online issue tracking system, which is public to any user. For simple everyday support issues there really isn’t much difference between open source support and proprietary software support.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Use the DETER Visualization tab to show the network and use arp and ifconfig commands to detect MAC and IP addresses for each machine.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Ping screening is a device used by people who want to get access to a computer either legally or illegally. Hackers that are trying to gain access to any computers within a company or home will use a Ping sweep to see if any computers are on. Network Administrators and also use a Ping sweep to see which computers are on as well, but for fixing or making adjustments as needed within their network. IP companies also send a Ping sweep which helps them determine if there is a problem between their hub and our internet connection.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    1. A customer calls into the call center to ask a question about setting up a server. The customer wants to know which ports to use to configure the server, where the ports are located, and how to access them. Select the problem statement that characterizes the customer's problem.…

    • 10888 Words
    • 32 Pages
    Powerful Essays
  • Satisfactory Essays

    Common Ports

    • 318 Words
    • 11 Pages

    COMMON PORTS packetlife.net TCP/UDP Port Numbers 7 Echo 554 RTSP 19 Chargen 2745 Bagle. H 6891-6901 Windows Live 546-547 DHCPv6 2967 Symantec AV 6970 Quicktime 560 rmonitor 3050 Interbase DB 7212 GhostSurf 22 SSH/SCP 563 NNTP over SSL 3074 XBOX Live 23 Telnet 587 SMTP…

    • 318 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Android Wifi Apps

    • 833 Words
    • 4 Pages

    Nmap is a network scanner tool which gives the entire information of the ip address and website. There is a version of nmap for Android users too, with the help of this app hackers can scan the ip's through mobiles.…

    • 833 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ports often have cargo-handling equipment, such as cranes and forklifts for use in loading ships, which may be provided by private interests or public bodies. Often, canneries or other processing facilities will be located nearby. Some ports feature canals, which allow ships further movement inland. Access to intermodal transportation, such as trains and trucks, are critical to a port, so that passengers and cargo can also move further inland beyond the port area.…

    • 1218 Words
    • 5 Pages
    Powerful Essays