StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security Assessment - Essay Example

Cite this document
Summary
This is one methodology used by hackers if they wish to gather information about an organization. As a consultant of assessing the network security for a large…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Network Security Assessment
Read Text Preview

Extract of sample "Network Security Assessment"

The paper "The Core of Hacking" is an outstanding example of an essay on information technology. Footprinting is the technique used in gathering information about a certain computer system and their entities. This is one methodology used by hackers if they wish to gather information about an organization. As a consultant of assessing the network security for a large organization, I must undertake various methodologies and use various tools in this assessment. Network scanning, on the other hand, is the process of identifying any active networks either to attack or assess them.

It can be conducted through vulnerability scanning which is an automatic process of identifying any vulnerability to determine whether the computer system can be threatened or exploited (Consultants., 2010). This type of scanning makes use of a software that looks for flaws in the database, testing the system for such flaws and coming up with a report on the same that is useful in tightening the security of the system.  In conducting footprinting, such methods as crawling may be used. Here, the network is surfed to get the required information about the targeted system.

Here, the consultant surfs on the website, blogs, and social sites of the targeted organization to get the required information about the system. However, open-source footprinting is the best method and easiest to navigate around and come up with an organization’s information. Tools used include domain name system (DNS) which is a naming system for computer systems connected to the internet. It associates various information gathered with their domain names that have been assigned to each participating entities.

It then translates the domain names to the IP addresses thus locating computer systems and devices worldwide. The specialist can use it in locating a computer system that they desire to scan. The specialist can also use the network enumeration tool where they can retrieve usernames and group’s information. It enables them to discover the devices of the host on a specific network using discovery protocols such as ICMP. They scan various ports in the system to look for well-known services to identify the function of a remote host.

They may then fingerprint the operating system of the remote host. Another tool is port scanning where software is used to probe a server for any open ports. It is mainly used in verifying security policies of their networks and by the attackers to identify any running services on a host to prevent its compromise (Dwivedi, 2014). The specialist may decide to port sweep where they scan multiple hosts to search for a specific service. The specialist can also make use of the SNMP which manages devices on the IP networks.

It is mostly used in network management systems to monitor the devices. it exposes any management data describing the configuration of the system. The main reason for these methods and tools is that the consultant has to find out the extent of threat or vulnerability to the system before scanning it and increasing the security measures. It is important for the specialist to gauge the extent of threat or vulnerability posed to the system before coming up with a lasting solution for the system to prevent such issues in the future.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Security Assessment Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Network Security Assessment Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1841831-network-security-assessment
(Network Security Assessment Essay Example | Topics and Well Written Essays - 500 Words)
Network Security Assessment Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1841831-network-security-assessment.
“Network Security Assessment Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1841831-network-security-assessment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Assessment

Network Security

The paper "network security" tells us about client machine.... nbsp;This trace contains 7 packets exchanged between two end points.... One end point is a client machine while other end point is a server with host name “linux-server”.... hellip; The client machine attempted to establish 3 tcp sessions with the server on port 80, port 135 and port 139....
12 Pages (3000 words) Research Paper

Firewalls and Proxy Servers

Largely due to the failure of our board of directors to understand that investment in network defense systems is an investment in the security of the company's most important asset, its data, our network defense systems are technologically retarded" (ICT Director).... While any one of these incidents should have convinced our board that our network defense systems needed an overhaul, it did not.... The ICT Department has been authorized to implement a more effective and efficient network defense system....
5 Pages (1250 words) Essay

Introduction to Networking

Therefore, through needs assessment, it becomes easier to know the vulnerabilities that a computer system may face.... Apart from Adventure works questionnaire, the other method that can be used to conduct the needs assessment of a computer network includes system analysis.... This method Introduction to Networking Introduction to Networking Needs assessment is essential in a computer network; it helps in identifying the areas that need to be changed in a computer network....
2 Pages (500 words) Essay

Elements of Security System

"The information Security Program and How a security assessment Fits In.... This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment.... hellip; When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits....
1 Pages (250 words) Coursework

Security consultant

Defining the scope of Network Security Assessment is important as it forms the basis of understanding the budget and level of security defined by the policies of the company.... A secured company network is that which has instituted a set of procedures to… Risk assessment is a proactive network security measure that serves to identify risks, threats, and vulnerabilities that could endanger the Network Risk Assessment Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us