Ping Sweeps And Port Scans

Page 2 of 8 - About 71 Essays
  • Free Essay

    Sec280-Week1

    trust. Ping Sweeps and Port Scans Intro Ping sweeps and port scans are two methods commonly used by hackers to detect vulnerabilities on computer networks (InfoSoc, 2014). Hackers use ping sweeps to check on which computers are active and being used; while they use port scan to find open ports which can be used to breach a network. If these two methods are used by knowledgeable hackers, they can jeopardize personal data and cause severe effects on the entire computer network. Ping Sweep Ping

    Words: 1279 - Pages: 6

  • Premium Essay

    Ping Sweeps

    Ping Sweeps and Port Scans Devry University SEC-280-13755 Principles Info Sys Security 9/9/2012 Ping Sweeps and Port Scans There are various problems that organizations will face as a cost of doing business. Ping sweeps and port scans are noteworthy because they can affect normal operations. As technology advances, so do the inevitable threats to our cyber security. Ping sweeps and port scans are examples of the threats that most organizations are likely to face. These two

    Words: 774 - Pages: 4

  • Free Essay

    Information and Systems Technology - Ping Sweeps

    Ping sweeps and ports scans are common methods for hackers to try to break a network. As a system administrator this is a valid concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop efforts from hackers to acquire any data by using ping sweeps and ports scans. If hackers are constantly thwarted and discouraged from penetrating your network they normally move on to another site. With proper instruction, the right software and sufficient support

    Words: 655 - Pages: 3

  • Premium Essay

    Sec280

    SEC280 | Week 1 | Case study on Port scans & sweeps | | Jared's | 11/3/2012 | Brief description of what they are and are they dangerous to company! | To answer the main questions for the concerns of our network, NO. These items that have been heard about do not require immediate attention as they are considered normal. We are protected behind our firewall as well as if the employees do as asked at the end of their shift, we will have absolutely nothing to worry about. As more

    Words: 1129 - Pages: 5

  • Free Essay

    Case Study Week 1

    which our systems can still be accessed if we aren’t careful. Specifically, two harmful activities, ping sweeps and port scans can have a major impact on computer systems and can definitely cause worry if they aren’t prevented. Ping sweeps could have a major impact on computer systems because they are the first step of an intruder making his entry (Conklin, White, 2010). A ping sweep sends a ping or an ICMP echo request to the target or to multiple hosts (Rouse, 2005 pg. 12). It is being used

    Words: 600 - Pages: 3

  • Premium Essay

    Case Study Week 1

    Although ping sweeps and port scans have been around for some time now, they are still considered huge security threats, especially in a business where sensitive data flocks the network. Ping sweeps and port scans are computer activities allowing the person using these activities to gain access to a network or a device; they can be very useful in the right hands but also very dangerous in the wrong hands. A ping sweep is when an intruder sends an ICMP ECHO, or a ping request, to several devices on

    Words: 860 - Pages: 4

  • Premium Essay

    Internet Security

    Security Assessment of Ping Sweeps and Port Scans Antoine Rivers Devry University March 7, 2014 System security administrators will say that their network has been probed at some point or another. Hacking tools have become widespread and many in number and will likely continue to do so. Network probes are not infiltrations in themselves, however, they should not be overlooked because they can lead to real infiltrations. My essay will try to explain the two methods behind the most common network

    Words: 539 - Pages: 3

  • Premium Essay

    Case Study Week 1

    Ping Sweeps & Port Scans Well let’s start with Ping Sweeps. Ping sweeps are another kind of network probe. With Ping Sweeps it sends out ICMP ECHO packets to machines in our network. It searches through a range of IP addresses. It will wait until it get one to respond back saying it has found some IP address that are open and then the intruder will try to connect to them. The thing with Ping Sweeps is that it is used by the network admins as well. The only real problem is that if there is someone

    Words: 284 - Pages: 2

  • Premium Essay

    Sec280 Week 1

    Week 1 Boss, Regarding your recent inquiry regarding ping sweeps and port scans, I wanted to provide some information to assuage any apprehension you may have had regarding the subject. Port scans and ping sweeps are common networking tools used by admins to perform common functions, such as checking to see if a server is running a particular service or if a desktop is on to receive an important update. It is also true that this same functionality can provide information to hackers who may use

    Words: 406 - Pages: 2

  • Free Essay

    Sec230 Case Study 1

    you have inquired about, ping sweeps and port scans. A port scan identifies which ports are open a machine. When running a port scan you can tell which services may be running on the system. A ping sweep sends a ping (an ICMP echo request) to a targeted machine. If you wanted to determine what machines could be accessed and are active you would use a ping sweep. This is the first step of an attack. If the intruder can find a machine they can then attempt to use a port scan. Finding what services

    Words: 351 - Pages: 2

Page   1 2 3 4 5 6 7 8