Port Scans in Development
Autor: lastjokex • July 24, 2014 • Essay • 613 Words (3 Pages) • 1,049 Views
In this paper we will be going through all the processes which will show how dealing with security. An example would be the ping sweeps and port scans recently. This will show a complete example to how certain techniques can affect our work environment.
To start with, it should be known that either of these two methods could have malicious issues in order to also achieve certain goals. They can be used in order for a hacker to take advantage of our system or the host within it, but on the same page, network administrators also use these methods in order to make certain checks. I will explain first what each of these methods are and could do and also then have a simple option of how it can be dealt with if you would prefer.
Ping sweeps are when is a manner to see if you can establish the IP addresses in order to map out to a live host (our computers). There are different tools that can be used for them depending on the OS that is being used. We have the option if using Mac, Windows, or Unix. There are many reasons why an administrator would use this technique though. One of the reasons would be to see what is being active on the network and what is not. This can be of help if we are in the process of figuring out if there is a network issue and being able to diagnose it. When we ping it has a packet being sent out to a certain IP address and if that address is being used in an active manner, we will then receive a notification back, hence the ping. Other reasons we send a ping would be to see if the signal is strong enough along the network and see if there is any kind of packet loss. In the manner of a hacker, they would use this to look for a break in the network in order to break in. If they can see what computers are active they will know where to move in and press their attack on the network (Linux Journal, 2005). . Though at the end of the day I can say that this can be worked on and
...