Preview

Ping Sweeps and Port Scans Essay Example

Good Essays
Open Document
Open Document
532 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ping Sweeps and Port Scans Essay Example
Ping screening is a device used by people who want to get access to a computer either legally or illegally. Hackers that are trying to gain access to any computers within a company or home will use a Ping sweep to see if any computers are on. Network Administrators and also use a Ping sweep to see which computers are on as well, but for fixing or making adjustments as needed within their network. IP companies also send a Ping sweep which helps them determine if there is a problem between their hub and our internet connection.
Port Scans are usually used after a Ping screen has been successful finding a computer that is on. If a “Hacker” is using this device, they are trying to get access to the system to steal or harm the system in some way. Network administrators also use a Port Scan to see what ports are open on which computers to see if there is a security risk within their systems. IP companies will access a port that is open to see if they there is a good internet connection with their internet service. Ping screening can be controlled by uing a proper firewall, and the computer user using common sense. The easiest way to stop a Ping sweep from seeing which computer they can access is to turn it off when not in use if on a network, or disconnect from the internet when it is not needed. A Ping sweep is not the immediate threat, but it can be detected if one is used. The port scan that usually follows a Ping sweep can be an issue if the person trying to get in the computers is doing it illegally. A good firewall can help prevent any unnecessary ports from being opened or can detect a Ping sweep that is occurring within the system. A good firewall can show where the intrusion is coming from, and can give you the determination whether or not you or the Network Administrator will give the rights for that program to access the computer. Many software companies that have security updates usually will ask if they can use an automated update for their

You May Also Find These Documents Helpful

  • Good Essays

    NIC test: It also monitors health of the other firewall by testing NIC status whether the link is up or down (cisco 2008).…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    1. It can show hackers where to attack and what the most vulnerable parts of the traffic are.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    3. Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Database penetration testing is the technique of testing a database for vulnerabilities to hacking attacks. This type of penetration testing uses techniques designed to address general database vulnerabilities as well as specific database issues such as those related to Microsoft SQL or Oracle servers. Port scanning is a basic technique used in database penetration, in which is the process of scanning a network or system to find accessible ports. Familiarity with port scanning techniques is important. However open ports are vulnerable to an intrusion by a hacker.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    1. By opening ports in your firewall it is allowing people access to your network and if anybody tries to get in figures out the port, they can potentially gain access to your system.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Although The main purpose of port scanning is to find out as much information as you can on the target in order to see if there are any known vulnerabilities, port scanning has legitimate uses in managing networks, port scanning can be malicious in nature if someone is looking for a weakened access point to break into your computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays