This website uses cookies to ensure you have the best experience. Learn more

Net280 Wk1 Case Study

524 words - 3 pages

In reference to recent concerns over issues with ping sweeps and port scans. There are several diagnostic test called network probes that are run by Network Administrators to check servers regarding a particular service or updates needed for workstations within the company. In order to guard against nefarious computer activity, special security measures are needed to keep out intruders. Here is a brief assessment in more detail of how ping sweeps and port scans work.

A ping sweep or (ICMP sweep) Internet Control Message Protocol is a basic network scanning technique used to determine which range of IP Addresses are mapped to live host computers. As cracking tools become more popular and increase in number, this trend is likely to continue. Network probes are technically not ...view middle of the document...

(M.Rouse, 2005)

In ping sweeps a large range of IP Addresses send a set of ICMP Echo packets to a computer system to find out which ones will react to the ping. Ping sweeps are used legitimately by the Network Administrator to find out which machines are alive for diagnostic reasons and detect any vulneralability in the companies computer system. (Theo, 2000)
Tools used for conducting ping sweeps are fping that sends one packet to one IP Address then proceeds to the next address, showing the IP Address ranges alive on the network. This is important information to the Network Administrator because it tracks activity on unreachable computers as well. (Theo, 2000)
An Administrator can disable ping sweeps on a network by blocking ICMP Timestamp and Address Mask Request can be used in a similar manner. (M. Rouse, 2005)
A port scan is a method used by intruders to discover the services running on a targeted machine, and plan an attack on any vulnerable service on that computer. If a specific port is open they may find out what version of IMAP is running and be able to gain superuser access to the computer using an “exploit” program. (Theo, 2000)

Security checks and balances are an important process of testing and detecting vulnerabilities in the network system. In order to close security holes for open ports and IP Addresses using network probes will help prevent intrusive activity on servers and the workplace computers. Security maintenance is a top priority of a Network Administrator and ping sweeps and port scans ensures protection for our network.

References

Linux Journal, Retrieved July 13,2013, from http://www.linuxjournal.com/article/4234, By Lawrence Teo in Security, Dec.01,2000.

Other Papers Like Net280-Wk1-Case Study

Holidays In Albania Essay

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness Essay

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages proceeding examples. The Willowbrook Hepatitis Studies was a case in which individual rights were severed and respect for one’s autonomy was lost. In 1947, in Staten Island, NY, Willowbrook was opened. Willowbrook State School was a state-funded institution for developmentally disabled children intended to accommodate approximately 4,000. By 1965, that number reached a population high of about 6,000. This high population mixed with a short staff led

The Hitchhiker’S Guide To The Galaxy

1171 words - 5 pages had this strange unaccountable feeling that something was going on in the world, something sinister.’ ‘No,’ said the old man, ‘that’s just perfectly normal paranoia. Everyone in the Universe has that,’” (Adams 160). The novel reinforces absurdity in the universe as Arthur’s fair attempt to study the universe is refuted with a simple response suggesting that the facets of the universe should be easy to comprehend. The film however, had Arthur make

The Ford Motor Company Wage Increase Of 1914 And The Theory Of Incentives And Efficiency Wages

1252 words - 6 pages doubling these wages can only be justified if, in some other way, it generates an equal or superior amount of value (either through a better product, lower costs, or both). According to the theory of incentives and efficiency wages, this is indeed the case, and Henry Ford even asserted that this decision was one of the best-cost cutting judgements they ever made (Raff and Summers 1987). This paper will outline the history of Ford Motor’s 1914

Historical Analysis Of The Economical Breakthroughs Of The Industrial Revolution

1396 words - 6 pages revolution, capitalism was used as the dominant form of economy in England. This helped England’s economy become consistent and organized throughout the country. However, it also posed certain, significant, problems. In order for the perfect capitalism to be achieved, every citizen had to begin equal. This was not the case, as many descendants of nobility and very early entrepreneurs started England's switch to capitalism with a lot more money than most

Leadership Portrayed in Monologue from Shakespeare’s Henry V

1214 words - 5 pages for their family and their country’s reputation. (Jacqueline and Milton, 2012)In real life case, a successful leader usually has good communication skill when talk to followers, people cannot influence their team members without connect communication to them. Language is a most powerful tool used by leader to manage and influence people in different industries. (Seargeant, 2009) Henry’s speech with unlimited energy and confidence, he cheers up

Cuba Civil Rights

1906 words - 8 pages Oct 2013. "World Report 2013 Cuba."Human Rights Watch.Human Rights Watch, 2013.Web. 14 Oct 2013. Wylie, Lana. "The Special Case of Cuba."International Journal 67.3 (2012): 661-84. ProQuest.Web. 9 Oct. 2013. "2012 Human Rights Reports: Cuba." U.S Department of State Diplomacy in Action.Bureau of Public Affairs, 19 04 2013.Web. 14 Oct 2013.

US Freight System

1273 words - 6 pages “Free Riders” are part of the business. When the Supreme Court decides a case that NITL has analyzed and promoted from the beginning, that decision applies across the land, everyone benefit from it. Bruce J. Carlton The League members pay a membership due every year, and they expect as a return a benefit, and whenever NITL accomplish goals, its members benefit but all the other shippers benefit as well. This is a threat that open the door

Democratic Peace Theory

1852 words - 8 pages the United States against the USSR as an example of how emotions almost destroyed two nations. People were spying on their own family members out of fear of being branded a communist and the fear of nuclear annihilation was ever present danger that children were doing drills in case of nuclear fallout. Had it not been for Gorbachev assuming power in Russia and letting his people see what freedom was about through his policies, we would not be here

Booker T. Washington

1621 words - 7 pages “Success is to be measured not so much by the position that one has reached in life as by the obstacles which he has overcome” –Booker T. Washing. Booker Taliaferro Washington was born in Hale’s Ford, Virginia on April 5th, 1856 to Jane Burroughs and an unknown White man. Washington was married three times. His first wife was Fannie N. Smith from Malden, West Virginia. Booker and Fannie were married in the summer of 1882 and had one child

Related Essays

Partnership Act Essay

1208 words - 5 pages ) | | | |Expression carrying on business implies a repetition of acts and excludes the case of an | | | |association formed for doing one act which is never to be repeated

Freedom And Responsibility Essay

2141 words - 9 pages amendment is “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercises thereof” (Jordan, 1999). Therefore, the first amendment states citizens have freedom of religion and exercises of the religion. The article entitled “Lawsuit alleges FBI violated Muslims’ freedom of religion,” published by Jerry Markon, Washington Post Staff Writer, justifies the detailed case of the FBI surveillance targeting Muslims for

Hate Crime Laws Essay

2348 words - 10 pages Death of James Byrd”). While this particular case may give the appearance that perpetrators of hate crimes receive appropriate punishment, almost a decade later, one particular case demonstrates the inequity in the application of hate crime punishments: In 2007, Sean Kennedy of Charleston, South Carolina, left a bar around 3:45 am and was confronted by Stephen Moller, who called him a “faggot” and then punched him so hard in the face that his

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are