StudentShare solutions
Triangle menu

See Attached - Case Study Example

Not dowloaded yet

Extract of sample
See Attached

The ping is an important utility of the Internet Control Message Protocol (ICMP) that helps in verifying that a given host is operational (Chen & Davis, 2006). Ping sweeps are used to detect the IP addresses that are being used by live hosts. Ping messages are made up of a pair of ICMP messages referred to as Echo Request and Echo Reply (Chen & Davis, 2006). Unfortunately, ping is usually taken advantage of by attackers to scan a block of IP addresses for a set of active hosts. There are many tools that can perform a ping sweep, and this further makes it easy for attackers to exploit. The major advantage is that ping sweeps can easily be noticed. In addition, it possible for ICMP messages to be blocked, and therefore some organizations might opt to block these messages as a safety precaution. When the administrator wants to carry out a ping sweep, he may enable the ICMP messages temporarily and block them after the ping sweep (Chen & Davis, 2006). Generally, ping sweeps are an old and slower technology, and are rarely used today.
A port scan refers to a series of messages sent by an individual with the intent of breaking into a computer system (Christopher, 2014). The messages are sent to each port one by one. Once the attacker breaks into the computer, he will be able to learn about the computer network services each associated with a port number provided by that computer (Christopher, 2014). The attacker can also learn about the owners of these services and understand whether or not anonymous logins are supported on that computer. A server that is publicly accessible is highly susceptible to port scans. Luckily, port scans are easy to detect. In addition, using the proper tools, the amount of information relating to open services can be limited. One way of limiting this information is the use of TCP Wrappers which allow the administrator greater levels of flexibility ...Show more

Summary

Unfortunately, computer systems are usually targeted by hackers who want to take advantage of such systems for their own gain or to cause malice. Electronic attacks have become common and…
Author : mtoy
See Attached essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the case study on your topic
"See Attached"
with a personal 20% discount.
Grab the best paper

Related Essays

See Assignment Criteria
the killing must be unlawful; 2. to be homicide, the victim must be a "life in being" (i.e., not a fetus); 3. for a person to be convicted of murder or manslaughter, it must be shown that the defendant's action actually caused or brought about the death of the victim and that death occurred within a year and day of his action.
6 pages (1500 words) Case Study
See 'Assignment Criteria' below
Mandy's union representative advised her that she could rely upon the Health and Safety in Offices Directive, which covered injuries sustained in that kind of working environment. This Directive was passed in October 2002, requiring member states to implement it by December 2003 at the latest.
7 pages (1750 words) Case Study
Research Paper (case study) on Ethics using gidelines as attached by uploaded support document
(Petrick & Quinn 1997, p. 42). Expanding on it, ethics is an attempt to determine which of the goals and objectives are worth pursuing in the long run, keeping in mind the
4 pages (1000 words) Case Study
Cisco Case - Case Study and questions attached
According to Mcafee, Mcfarlan and Wagonfeld (5) the first action taken by Boston involved asking all teams to hold off on any new tools,
3 pages (750 words) Case Study
Case Study attached
However, HC Administrator would need human resources on experts on guidance and counseling. These experts will provide valuable information to employees on respect for each other and necessity of communication. The
1 pages (250 words) Case Study
HRM case study( see attached)
The problems in technological innovations, the poor management structures, and the low morale of the workers and increased threat of new competitors have challenged the
8 pages (2000 words) Case Study
See Attached Instructions
Additionally, sensitive data may trigger other research firms to implement their replica research findings prior to the parent’s firm implementation thus leading to
2 pages (500 words) Case Study
See order instructions
This issue has been expanding in magnitude recently with the NCAA maintaining its stand that it has no responsibility over college students, and that the responsibility lies with the constituent colleges. In short,
9 pages (2250 words) Case Study
See intructions
Regulations in the United States and EU use statutes to enhance a competitive setting in the intermodal transport through statutes that control the way industry players conduct their
2 pages (500 words) Case Study
Capital Budget case study
It could raise a conflict of interests as Rolland wants to pursue the investment despite its negative implications for the business. Creditability: It is Rolland’s responsibility to communicate the information derived from the
2 pages (500 words) Case Study
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation