StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ping Sweeps and Port Scans - Case Study Example

Cite this document
Summary
The paper “Ping Sweeps and Port Scans” will look at electronic attacks, which have become common and pose a major threat to individuals and organizations. Port scanning and ping sweeping are two popular techniques used by hackers to exploit systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Ping Sweeps and Port Scans
Read Text Preview

Extract of sample "Ping Sweeps and Port Scans"

PING SWEEPS AND PORT SCANS Affiliation Computer systems have become an important component in organizations, businesses and homes. Unfortunately, computer systems are usually targeted by hackers who want to take advantage of such systems for their own gain or to cause malice. Electronic attacks have become common and pose a major threat to individuals and organizations. Port scanning and ping sweeping are two popular techniques used by hackers to exploit systems. All systems that are connected to the internet are prone to these forms of attack.

Although ping sweeping and port scanning are dangerous can lead to data and information loss, they can easily be detected and defended against. The ping is an important utility of the Internet Control Message Protocol (ICMP) that helps in verifying that a given host is operational (Chen & Davis, 2006). Ping sweeps are used to detect the IP addresses that are being used by live hosts. Ping messages are made up of a pair of ICMP messages referred to as Echo Request and Echo Reply (Chen & Davis, 2006).

Unfortunately, ping is usually taken advantage of by attackers to scan a block of IP addresses for a set of active hosts. There are many tools that can perform a ping sweep, and this further makes it easy for attackers to exploit. The major advantage is that ping sweeps can easily be noticed. In addition, it possible for ICMP messages to be blocked, and therefore some organizations might opt to block these messages as a safety precaution. When the administrator wants to carry out a ping sweep, he may enable the ICMP messages temporarily and block them after the ping sweep (Chen & Davis, 2006).

Generally, ping sweeps are an old and slower technology, and are rarely used today. A port scan refers to a series of messages sent by an individual with the intent of breaking into a computer system (Christopher, 2014). The messages are sent to each port one by one. Once the attacker breaks into the computer, he will be able to learn about the computer network services each associated with a port number provided by that computer (Christopher, 2014). The attacker can also learn about the owners of these services and understand whether or not anonymous logins are supported on that computer.

A server that is publicly accessible is highly susceptible to port scans. Luckily, port scans are easy to detect. In addition, using the proper tools, the amount of information relating to open services can be limited. One way of limiting this information is the use of TCP Wrappers which allow the administrator greater levels of flexibility either to permit or deny access to the services (Christopher, 2014). Furthermore, PortSentry is another tool offered by Psionic which is capable of detecting requests on selected ports (Christopher, 2014).

Based on the analysis above, it is clear that ping sweeps and port scans are a threat to the security of an organization. However, it is easy for an organization to detect and deal with ping sweeps and port scans. Therefore, these activities are not something to worry about if the right defense strategies and policies are in place. If the organization deploys the necessary tools, dealing with these threats is easy. In conclusion, port scans and ping sweeps are dangerous processes that can expose an organization to great risk.

However, both processes can easily be detected and their threat neutralized. It is important that an organization puts the right policies and defense mechanisms in place to deal with such threats. ReferencesChen, T. M & Davis, C (2006). An Overview of Electronic Attacks. In P. Kannellis, E. Kiountouzis & N. Kolokotronis (Eds.), Digital Crime and Forensic Science in Cyberspace (pp. 1-21). Idea Group Inc. Christopher, R (2014). Port Scanning Techniques and the Defense Against Them. SANS Institute.

Retrieved from http://www.sans.org/reading- room/whitepapers/auditing/port-scanning-techniques-defense-70

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ping Sweeps and Port Scans Case Study Example | Topics and Well Written Essays - 500 words”, n.d.)
Ping Sweeps and Port Scans Case Study Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/logic-programming/1645138-see-attached
(Ping Sweeps and Port Scans Case Study Example | Topics and Well Written Essays - 500 Words)
Ping Sweeps and Port Scans Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/logic-programming/1645138-see-attached.
“Ping Sweeps and Port Scans Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/logic-programming/1645138-see-attached.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ping Sweeps and Port Scans

Theatre Thyroid Radiation Exposure in trauma and orthopedic surgery

During trauma surgery of long bones, intra-operative fluoroscopy is frequently used to guide placement of fixation devices.... The use of radiation with inconsistent wear of protective thyroid collars highlights the need to measure radiation exposure to the gland.... hellip; Different surgical modifications have been connected with all the stages of trauma and orthopedic surgery....
4 Pages (1000 words) Research Paper

Computer Activities: Ping Sweeps and Port Scans

In the paper “Computer Activities: Ping Sweeps and Port Scans” the author analyzes Ping Sweeps and Port Scans and impacts on organization.... ing sweeps and port scans are often dangerous for networks handling sensitive information.... Countermeasures for ping sweeps and port scanning also include disabling unnecessary services so that these services do not become trapped in the port scanning process (Scrambay, J, McClure, S, p....
2 Pages (500 words) Essay

Ancient Aegean Art: Lion Gate and the Mask of Agamemnon

The author compares Lion Gate and the Mask of Agamemnon works which are characteristic of Mycenaean culture that speaks of the militaristic and artistic abilities of its people.... The Minoan influence is clear on the column design of the Lion Gate and metalwork details of the Mask of Agamemnon.... nbsp; … Mask of Agamemnon is made from a hammered gold sheet, while Lion Gate is made of sedimentary rock, clay, and possibly gold....
4 Pages (1000 words) Research Paper

Culture / festivals and traditions in the Uk

In order to understand other people better it is not enough to get just knowledge of the language, it is important to get acquainted with its history and culture.... United Kingdom is a relatively small island, and… They are believed to be the most conservative nation in Europe.... The best example is their queen, parliamentary monarchy, monetary system and their system of measures (Barrow, 2013). Englishmen are a They do not like the neighbors to intervene their lives....
4 Pages (1000 words) Essay

China as the Biggest Exporter of Rice in the World

Most, if not all, Chinese have tasted it as it is the staple food in China.... That makes it quite easy for one to make a guess, and most will be right to conclude that the… I come from the Northeast part of China, the most agricultural part of China.... My hometown has a reputation for the production of excellent rice....
4 Pages (1000 words) Essay

Chinese dessert culture

Its population is made of Asians, blacks and whites alike.... Though this part of California was supposed to be dominated with Native Americans, its population has kept on swelling… This explains why even the mayor of the area traces his origin from the East.... The last report on the census shows that Asians have even surpassed the 33% by population. To be precise, the last census puts the Asian population to be This is according to 2013 population estimate....
4 Pages (1000 words) Research Paper

Network Scanning Over the World

Scanning processes such as port scans and ping sweeps return details which the respective IP addresses map to the live host that is active on the internet and what use this address offers.... It starts of the discussion by describing the meaning of the network scanning as a process to establish active hosts on a network and follows on to cover port scanning which is a technique for attackers to discover exploitable communication channels that they can use to break into systems....
8 Pages (2000 words) Case Study

The Indians of South East America and Their Traditions

This paper "The Indians of South-East America and Their Traditions" focuses on the fact that South Eastern Indian people are Native American Indians who occupy the South-Eastern part of the US.... The cultural practices of Indian people were similar to those of Indians from the neighbouring regions....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us