Writing tips and writing guidelines for students,case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Thursday, 23 May 2019
Threat Assessment of Ping Sweeps and Port Scans
Threat Assessment of Ping Sweeps and Port Scans Ping sweeps and larboard scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks aegis and befool access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address D one by put in a virus program into a users email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008).The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as skillful described it is vitally important to address and moderate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of str ong Firewall protections. To better comprehend the danger that ping sweeps and port scans can represent here is a more detailed explanation of all(prenominal) of these techniques.Ping sweeps First, a ping is a computer network utility tool using the Internet Control Message Protocol (ICMP) to send multiple data packets to a target array device such as server, workstation, or printer to establish whether that host device on a network is actively present (turned on, or active) and able to communicate. If the target host device in question sends back a reply then that device is determined to indeed be active on the network. So at that placefore, a ping sweep is number of pings that are executed to determine which out of a range of IP addresses map over to live host devices (Rouse, 2005).To perform this task thither are several available software tools to choose from, such as fping, gping, and Nmap for UNIX systems. Also, there is Rhino9s Pinger software and SolarWinds Ping Sweep fo r Windows systems. After using such a tool a malicious user can know which host devices on a network are actively available and then proceed to performing a technique called a port scan to search to gain access to those devices. Port Scanning Port scanning is technique used to identify any open or closed TransmissionControl Protocol (TCP) or User Datagram Protocol (UDP) network communication ports or services on a network host device. For example, port number 110 is assigned to extend Office Protocol three (POP3) for email client application communications on a network. There can be up to 65,000 ports any one computer or host device and any bracing open ports as determined by a port scan may depart a malicious user unauthorized access to it. This is akin to an open window in a house whereas a burglar can gain access to it (Facts about port, ).Also, accessive port scanning can lead to a denial of service (DoS) attack and not allow authorized users to access their data. Finally, t here are again several utility tools available to perform port scanning such as Nmap as mentioned previously or SolarWinds Port scanner. Firewall To mitigate the security threat posed by ping sweeps and port scans it is highly recommended that firewall protection on all network hosts devices should be enabled to close any unused ports to protect them from unauthorized access.Also, is recommended that the use of a firewall server to protect the network from any outside intruders be used as well. In conclusion, ping sweep and port scanning can threaten the security of a Business Enterprises network and steps to handle security should be implemented to mitigate as much as possible any possibility that any data is kept confidential, that its integrity remains intact, and is always available.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment