Case Study on Ping Sweeps

Submitted by: Submitted by

Views: 665

Words: 703

Pages: 3

Category: Other Topics

Date Submitted: 03/02/2012 06:57 PM

Report This Essay

In today’s technology there are many different fast growing terms and ideas. I will discuss what ping sweeps are and how do they work as well as port scans.

To begin with, according to a case study by Gregory M (Chip) Pyles Jr, Ping sweeps and port scans are computer activities that unethical people could use to gain access to personal or company networks. Ping sweeps and port scans can be dangerous, but can also be prevented. Ping sweeps is when an intruder sends an ICMP ECHO to a range of machines on a network. Then the machines on the network send a signal back to the intruder to let him/her know that they are on. The machines that are not on or available do not send a signal. This is an easy way for the intruder to know where to start on his/her intrusion. Now, pings sweeps is not 100% for intruders, but rather it is for network administrators on their own network. The ping sweeps are to determine which machines are alive and which ones are not. This could be for trouble shooting purposes or for licenses issues. Ping sweeps are a good tool unless you have a malicious person out there wanting to do damage.

Port scans are the most common probing tool available. Port scans take ping sweeps to a different level. Port scans actually “look” at a machine that is alive and scan for an open port. Once the open port is found, it scans the port to find the service it is running. Once it finds the service the port is running, it gives the intruder power and knowledge about your system. It basically gives him/her an edge in taking over your machine. Protecting ourselves can be very easy. Number one rule to remember at all times is to always assume vulnerability. No one machine on a network is completely safe from an intruder. The best way to protect yourself is to never expose your important security information on a machine. Passwords, SSN, financial information and password hints should be kept on an encrypted flash drive. Keeping this information stored on your...