We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Ping Sweeps and Port Scans - Case Study Example

Comments (0)
The paper “Ping Sweeps and Port Scans” will look at electronic attacks, which have become common and pose a major threat to individuals and organizations. Port scanning and ping sweeping are two popular techniques used by hackers to exploit systems…
Download full paper
Ping Sweeps and Port Scans
Read TextPreview

Extract of sample
Ping Sweeps and Port Scans

Download file to see previous pages... Ping sweeps are used to detect the IP addresses that are being used by live hosts. Ping messages are made up of a pair of ICMP messages referred to as Echo Request and Echo Reply (Chen & Davis, 2006). Unfortunately, ping is usually taken advantage of by attackers to scan a block of IP addresses for a set of active hosts. There are many tools that can perform a ping sweep, and this further makes it easy for attackers to exploit. The major advantage is that ping sweeps can easily be noticed. In addition, it possible for ICMP messages to be blocked, and therefore some organizations might opt to block these messages as a safety precaution. When the administrator wants to carry out a ping sweep, he may enable the ICMP messages temporarily and block them after the ping sweep (Chen & Davis, 2006). Generally, ping sweeps are an old and slower technology and are rarely used today.
A port scan refers to a series of messages sent by an individual with the intent of breaking into a computer system (Christopher, 2014). The messages are sent to each port one by one. Once the attacker breaks into the computer, he will be able to learn about the computer network services each associated with a port number provided by that computer (Christopher, 2014). The attacker can also learn about the owners of these services and understand whether or not anonymous logins are supported on that computer. A server that is publicly accessible is highly susceptible to port scans. Luckily, port scans are easy to detect. In addition, using the proper tools, the amount of information relating to open services can be limited.  ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
Port strategy
The growth in trade quantity is increasing the prospects of global and integrated port services. Many major port operator companies have evolved and engaged in competition with each other. The competition demands the needs for innovation and use of new technology for the port operator companies.
8 Pages(2000 words)Essay
Port Management
There was minimal competition between ports and port-related costs were very low compared to the cost of water transport. As a result of these, there was little motivation and incentives to improve the levels of port efficiency. At present, there is continued need to restructure port operations in a manner that it will enable port management and governments to deal with external factors that affect the viability of ports.
8 Pages(2000 words)Essay
Port Management
Many of the countries are preparing the strategic plans for developing the old port. The need for awareness about the sources and the advantages is very much important by competent authorities for this development. Understanding sources of sustained competitive advantage for firms has become a major area of research in the field of strategic management.
5 Pages(1250 words)Assignment
Ping Sweeps and Port Scans
Some other activities have rather disturbing impacts and hence hamper the smooth functioning at workplace. Amongst various activities are ‘ping sweeps and port scans’. The following paper discusses these two activities and their impacts on
2 Pages(500 words)Assignment
Port au Prince, Haiti
ed in Port-au-Prince which is considered as Haiti’s lifeline to the world having ninety percent of its major port activity (Mosley, 2010; Hall, 2010). Needless to say, the country’s transportation system has been enormously affected to the detriment of its commerce and trade
2 Pages(500 words)Essay
Port Security
Most ships calling at U.S. portsare foreign owned with foreign crews”(pg.11) Much port can be a victim of terrorist attack because of their accessibility to urban areas and due to their handling of numerous
4 Pages(1000 words)Assignment
Port Security
In the present time, an estimated seven million containers of cargo pass through ports in the United States every year. In the port of Boston alone, one of the oldest ports since the year 1630, an estimated 1.3 million tons general cargo and 12.8
10 Pages(2500 words)Research Paper
Port management
Hence, countries invest substantially towards the development of the same. This can be better comprehended from the example of Ports Sector in China, which
12 Pages(3000 words)Essay
Ping Pong and China
Ping pong as a game in China gained popularity due to several reasons. The reasons include the low cost of the game since no professional requirement is needed (Griffin, 2004). The activity also came to gain popularity due to
6 Pages(1500 words)Essay
Port Report
While doing so, the paper also deals, briefly with the subject of global stock markets’ volatility in relation to changing oil prices. The price of crude oil has gone down by almost 40 percent during the last six months of
4 Pages(1000 words)Essay
Let us find you another Case Study on topic Ping Sweeps and Port Scans for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us