StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Activities: Ping Sweeps and Port Scans - Essay Example

Cite this document
Summary
In the paper “Computer Activities: Ping Sweeps and Port Scans” the author analyzes Ping sweeps and port scans and impacts on organization. Computer activities fall into broad categories of the ones which enhance the proper functioning of other programs running on a computer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Computer Activities: Ping Sweeps and Port Scans
Read Text Preview

Extract of sample "Computer Activities: Ping Sweeps and Port Scans"

A ping sweep is a very fundamental scanning activity used to primarily determine the range of IP addresses that map to live hosts (TechTarget, 2002). Usually, we ping a computer to know the active presence of the desired host. However, ping sweeps do it for a multitude of computers. A ping sweep is also known as ICMP (Internet Control Message Protocol) sweep (TechTarget, 2002). Ping sweeps can be performed voluntarily by an organization to determine active hosts. Upon determination, we use this data to perform data transactions/sharing between desired active hosts.

It can also be performed by an outsider with an intention to drag information out of a computer database for wrong purposes. The process of knowing active hosts in the ping sweep is similar to an act where a pickpocket identifies his prey in a crowded bus (Murali, 2004). Every sweep is an attempt with hope. We can take stringent security measures to avoid responding to external pings.Once the computer responds to ping sweep, there begins the next process of port scanning. A Port scan is a process of sending messages to a port for determining the type of network services offered by the host (Ireland, S, 2009).

Upon receiving messages the ports respond with their status of being in use or being dormant. Depending upon this status information, the tuned port can now be used for hacking useful and often confidential information. The ports represent potential communication channels and thus we can explore the networked environments with ease (Fyodor, 1997). The effect of such network exploration can cost our organization its valuable information often considered confidential. We should take all possible measures to avert losses to our company from such hazardous activities.

Ping sweeps and port scans are often dangerous for networks handling sensitive information. As far as our organization is concerned, such activities should be consciously avoided from intruding into our system by taking precautionary measures. Such measures include setting up of firewall; by doing so we can bring a large number of attacks to a small number- refer the following diagram.Fig: A probable model with a firewall for security purposesWe can also follow a set of rules which allow giving responses only to desired scans.

Such as a port should be conditioned to listen only to certain signals and ignore all others. Countermeasures for ping sweeps and port scanning also include disabling unnecessary services so that these services do not become trapped in the port scanning process (Scrambay, J, McClure, S, p.67).In a nutshell, although ping sweeps and port scanning techniques are useful for internal data transactions, still they should be taken care of by using the above-mentioned techniques to safeguard organizational details from unwanted intrusions.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Activities: Ping Sweeps and Port Scans Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Computer Activities: Ping Sweeps and Port Scans Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1559848-ping-sweeps-and-port-scans
(Computer Activities: Ping Sweeps and Port Scans Essay Example | Topics and Well Written Essays - 500 Words)
Computer Activities: Ping Sweeps and Port Scans Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1559848-ping-sweeps-and-port-scans.
“Computer Activities: Ping Sweeps and Port Scans Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1559848-ping-sweeps-and-port-scans.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Activities: Ping Sweeps and Port Scans

Thinking Like a Hacker to Protect Your Network

A true computer security professional has the mindset of a hacker and is always mentally breaking into the system or thinking of possible ways and methods through which the system can be penetrated.... With such a mindset, a computer security professional or a user is best placed to protect his or her network given that he will be able to develop countermeasures to the possible vulnerability exploitation existing in the network (Kanclirz & Baskin, 2008)....
8 Pages (2000 words) Literature review

Nutritional Evaluation of Kurt Manning

The kcal mentioned under each day is relevant for the amount of time spent in the total activities comprising rest, inactivity, very light activity, light exercise, moderate exercise and heavy exercise....  This study discusses the nutritional evaluation of athletes Kurt Manning....
13 Pages (3250 words) Case Study

Road Transport Directive

The Road Transport Directive (RTD) is aggressively pushing the cause of Working time rules to all transport companies, come April 2005, over a time period of 26 weeks, by which all logistics companies in the UK have to embrace the guidelines.... It basically consists of a reduced lorry drivers time limits, from as high as 84 hours a week, to 48 hours a week....
29 Pages (7250 words) Coursework

A Critical Analysis of Computer Network Security Methods

The paper "A Critical Analysis of computer Network Security Methods" tells us about information technology.... The exponential growth of the most popular public network, the Internet, has made inter-communication fast and effective.... hellip; The amount of data flow through e-mails, e-commerce, etc has gained new peaks and is still growing....
21 Pages (5250 words) Essay

The Three Strategic Business Units of the Company

The case of Feingold Investments Inc.... was discussed with emphasis on the current problem arising out of the decision to install a LAN at the new office is set up to house the three Strategic Business Units of the company.... Three major problem areas being Management, Technical and Behavioral were identified....
24 Pages (6000 words) Essay

Ping Sweeps and Port Scans

The paper “ping sweeps and port scans” will look at electronic attacks, which have become common and pose a major threat to individuals and organizations.... ping sweeps and port scans Affiliation Computer systems have become an important component in organizations, businesses and homes.... Based on the analysis above, it is clear that ping sweeps and port scans are a threat to the security of an organization.... However, it is easy for an organization to detect and deal with ping sweeps and port scans....
2 Pages (500 words) Case Study

Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration

The paper “Timeliness, Bandwidth and Other Factors Essential When Performing scans or Enumeration" concerns factors that need to be considered to properly choose a type of scanning or enumeration to prevent vulnerabilities that might put corporative data at risk of getting access....
12 Pages (3000 words) Term Paper

Comparing Ethnicity as an Aspect of Urban Learning in the UK and the US

… Comparing ethnicity as an aspect of urban learning in the U.... .... and the U.... .... ntroductionLearning is an integral part of our lives.... For some, learning takes as much as a third of their lifetimes, while others consider learning as a life long process.... Comparing ethnicity as an aspect of urban learning in the U....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us