We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Ping Sweeps and Port Scans - Assignment Example

Comments (0)
Every day is a challenge to face threats and an opportunity to progress. Various computer activities are involved in data transaction processes. Some help us in boosting our organizational work by increasing speed and offering better…
Download full paper
Ping Sweeps and Port Scans
Read TextPreview

Extract of sample
Ping Sweeps and Port Scans

Download file to see previous pages... Computer activities fall into broad categories of the ones which enhance proper functioning of other programs running on a computer whereas others which render expected functioning difficult. We must safeguard our computers against the malicious activities. Information about a computer such as the details about its operating system, details about programs running on it, information about various protocols, details about usage of ports and responses to different functions are amongst those targeted by hackers and jammers in a network.
Ping sweep is a very fundamental scanning activity used to primarily determine the range of IP addresses which map to live hosts (TechTarget, 2002). Usually we ping a computer to know the active presence of the desired host. However, ping sweeps do it for a multitude of computers. Ping sweep is also known as ICMP (Internet Control Message Protocol) sweep (TechTarget, 2002). Ping sweeps can be performed voluntarily by an organization to determine active hosts. Upon determination we use this data to perform data transactions/sharing between desired active hosts. It can also be performed by an outsider with an intention to drag information out of a computer database for wrong purposes. The process of knowing active hosts in ping sweep is similar to an act where a pickpocket identifies his prey in a crowded bus (Murali, 2004). Every sweep is an attempt with hope. We can take stringent security measures to avoid responding to external pings.
Once the computer responds to ping sweep, there begins the next process of port scanning. Port scan is the process of sending messages to a port for determining the type of network services offered by the host (Ireland, S, 2009). Upon receiving messages the ports respond with their status of being in use or being dormant. Depending upon this status information, the tuned port can now be used for hacking useful and often confidential information. The ports represent potential communication ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
Car Port Design Project
Also, the different, material combinations that exist in the selection of a car port is also included here. Finally the engineering of the car port system and the inputs required for this exercise like preparing a bending moment and shear force diagrams are also presently.
8 Pages(2000 words)Assignment
Port Management
Many of the countries are preparing the strategic plans for developing the old port. The need for awareness about the sources and the advantages is very much important by competent authorities for this development. Understanding sources of sustained competitive advantage for firms has become a major area of research in the field of strategic management.
5 Pages(1250 words)Assignment
Port Security
Most ships calling at U.S. portsare foreign owned with foreign crews”(pg.11) Much port can be a victim of terrorist attack because of their accessibility to urban areas and due to their handling of numerous
4 Pages(1000 words)Assignment
Network Routing
Working configurations of all the devices are also discussed. Link-state routing protocol works on Shortest Path First (SPF) algorithm; for reaching destination it searches the best path.
10 Pages(2500 words)Assignment
Answer Questions
How concerned are you about this finding? Include your reasoning. These vulnerabilities are caused by errors in Mozilla maintenance service when interacting with
1 Pages(250 words)Assignment
CYB Week 2 Discussion
Web applications find flaws in enterprises Web apps before the attackers do. You will insert SQL into back-end databases, learning how attackers exfiltration delicate data. You will use cross-site scripting attacks to
1 Pages(250 words)Assignment
TCP/IP Associations Lab
After exploring the higher-layer transport protocols, you would like to know how TCP/IP keeps track of all the different sessions on a typical networked PC. You decide to examine the protocols, ports, and processes involved in the typical browsing of a Web site. Hint:
3 Pages(750 words)Assignment
Port Maritime Legislation
At the core of the legislation are risk-based security measures that emphasize collaboration between the Coast Guard and the Customs and Border Protection. To achieve this objective, the Act: The
2 Pages(500 words)Assignment
Jebel Ali Port and Free Zone - Its Impact on Companies Supply Chain Operations
This paper would also analyze the benefits that our company, retailers, distributors and customers have, because of holding an operational base in the Jebel Ali
12 Pages(3000 words)Assignment
Port Maritime Legislation
at enables cooperation between the Homeland Security Department, local and state law enforcement agencies in enhancing the security of the maritime sector. This law also ensures cost cutting with the enhanced levels of cooperation between the local stakeholders, international,
1 Pages(250 words)Assignment
Let us find you another Assignment on topic Ping Sweeps and Port Scans for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us