Preview

Unit 3 Assignment 1: Choosing Port Scanning

Satisfactory Essays
Open Document
Open Document
216 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 1: Choosing Port Scanning
Unit 3 Assignment 1
Choosing Port Scanning
1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports. 2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.
3. Nmap (Zenmap) is open source port scanning software that I would prefer.
4. As the software recommender for the company I would have to recommend Nmap to the Senior Administrator. Features of Nmap is that it is useful for performing tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    The server roles and features that would be recommended for the company are as follows:…

    • 776 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    5. Which network support services team identifies whether the client site has existing network hardware and circuits installed?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans, like I stated earlier, are used to discover what services are running on a certain machine. Each service offered by our servers makes user of ports by which TCP/IP requests are sent. Hackers use this information to determine what types of vulnerabilities they can use; this is why the only ports that are open are the ones that we are using. By keeping all other ports closed this keeps hackers from opening other unnecessary openings.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this assignment, you will explain the purpose of port scanning and choose port scanning software to increase server security.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Port scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking…

    • 838 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Refining Solutions

    • 947 Words
    • 4 Pages

    A program that allows people to see how computers on the network are running, allowing the opportunity for regular maintenance on systems. There is also the ability to contact a professional immediately and have help with any possible problems that might be at hand.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Mixed Economy

    • 499 Words
    • 2 Pages

    The Information Technology industry has been a big part and demand in every industry that needs and requires technical support, especially in most businesses that rely on computer networks. Whether small, medium or large companies’,…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking Tools

    • 351 Words
    • 2 Pages

    Packet sniffers like Wireshark, Cain and Abel, dSniff can be used to sniff IP packets sent over your network. These tools can be used to monitor network traffic which is a good thing for your administrators. But it could also be used to let hackers know of the information being exchanged within in your network and also your internet traffic. These can be valuable tools to help show vulnerabilities within your network.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Antivirus software performs many functions to prevent infection and remove malicious logic that has infiltrated a computer system. Scanning email prior to download can ensure that there is no unwanted code in email attachments. Periodically scanning computer files can also help antivirus software isolate any viruses that have…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Ports are an important form of infrastructure in Indian economy. They play a vital role in facilitating international trade and commerce by providing an interface between the ocean transport and land-based transport. India has an extensive coastline of about 7517 km spreading on the Western and Eastern shelves of the mainland as well as along the Islands. It has a well-established port infrastructure covering 12 major ports and 200 minor/intermediate ports (non-major ports), spreading across 9 coastal…

    • 12896 Words
    • 52 Pages
    Powerful Essays
  • Powerful Essays

    The paper concludes with the estimations and comparisons to port having similar characteristics. Finally, it discusses policy implications resulting from the research findings.…

    • 6615 Words
    • 27 Pages
    Powerful Essays