StudentShare solutions
Triangle menu

Ping Sweeps and Port Scans - Assignment Example

Nobody downloaded yet

Extract of sample
Ping Sweeps and Port Scans

Computer activities fall into broad categories of the ones which enhance proper functioning of other programs running on a computer whereas others which render expected functioning difficult. We must safeguard our computers against the malicious activities. Information about a computer such as the details about its operating system, details about programs running on it, information about various protocols, details about usage of ports and responses to different functions are amongst those targeted by hackers and jammers in a network.
Ping sweep is a very fundamental scanning activity used to primarily determine the range of IP addresses which map to live hosts (TechTarget, 2002). Usually we ping a computer to know the active presence of the desired host. However, ping sweeps do it for a multitude of computers. Ping sweep is also known as ICMP (Internet Control Message Protocol) sweep (TechTarget, 2002). Ping sweeps can be performed voluntarily by an organization to determine active hosts. Upon determination we use this data to perform data transactions/sharing between desired active hosts. It can also be performed by an outsider with an intention to drag information out of a computer database for wrong purposes. The process of knowing active hosts in ping sweep is similar to an act where a pickpocket identifies his prey in a crowded bus (Murali, 2004). Every sweep is an attempt with hope. We can take stringent security measures to avoid responding to external pings.
Once the computer responds to ping sweep, there begins the next process of port scanning. Port scan is the process of sending messages to a port for determining the type of network services offered by the host (Ireland, S, 2009). Upon receiving messages the ports respond with their status of being in use or being dormant. Depending upon this status information, the tuned port can now be used for hacking useful and often confidential information. The ports represent potential communication ...Show more

Summary

Every day is a challenge to face threats and an opportunity to progress. Various computer activities are involved in data transaction processes. Some help us in boosting our organizational work by increasing speed and offering better…
Author : flaviobartell
Ping Sweeps and Port Scans essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Ping Sweeps and Port Scans"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Car Port Design Project
Also, the different, material combinations that exist in the selection of a car port is also included here. Finally the engineering of the car port system and the inputs required for this exercise like preparing a bending moment and shear force diagrams are also presently.
8 pages (2000 words) Assignment
Port Management
Many of the countries are preparing the strategic plans for developing the old port. The need for awareness about the sources and the advantages is very much important by competent authorities for this development. Understanding sources of sustained competitive advantage for firms has become a major area of research in the field of strategic management.
5 pages (1250 words) Assignment
Port Security
Most ships calling at U.S. portsare foreign owned with foreign crews”(pg.11) Much port can be a victim of terrorist attack because of their accessibility to urban areas and due to their handling of numerous
4 pages (1000 words) Assignment
Network Routing
Working configurations of all the devices are also discussed. Link-state routing protocol works on Shortest Path First (SPF) algorithm; for reaching destination it searches the best path.
10 pages (2500 words) Assignment
Answer Questions
How concerned are you about this finding? Include your reasoning. These vulnerabilities are caused by errors in Mozilla maintenance service when interacting with
1 pages (250 words) Assignment
CYB Week 2 Discussion
Web applications find flaws in enterprises Web apps before the attackers do. You will insert SQL into back-end databases, learning how attackers exfiltration delicate data. You will use cross-site scripting attacks to
1 pages (250 words) Assignment
TCP/IP Associations Lab
After exploring the higher-layer transport protocols, you would like to know how TCP/IP keeps track of all the different sessions on a typical networked PC. You decide to examine the protocols, ports, and processes involved in the typical browsing of a Web site. Hint:
3 pages (750 words) Assignment
Port Maritime Legislation
At the core of the legislation are risk-based security measures that emphasize collaboration between the Coast Guard and the Customs and Border Protection. To achieve this objective, the Act: The
2 pages (500 words) Assignment
Jebel Ali Port and Free Zone - Its Impact on Companies Supply Chain Operations
This paper would also analyze the benefits that our company, retailers, distributors and customers have, because of holding an operational base in the Jebel Ali
12 pages (3000 words) Assignment
Port Maritime Legislation
at enables cooperation between the Homeland Security Department, local and state law enforcement agencies in enhancing the security of the maritime sector. This law also ensures cost cutting with the enhanced levels of cooperation between the local stakeholders, international,
1 pages (250 words) Assignment
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment