Net280-Wk1-Case Study

Submitted by: Submitted by

Views: 249

Words: 510

Pages: 3

Category: Other Topics

Date Submitted: 07/28/2013 07:16 PM

Report This Essay

In reference to recent concerns over issues with ping sweeps and port scans. There are several diagnostic test called network probes that are run by Network Administrators to check servers regarding a particular service or updates needed for workstations within the company. In order to guard against nefarious computer activity, special security measures are needed to keep out intruders. Here is a brief assessment in more detail of how ping sweeps and port scans work.

A ping sweep or (ICMP sweep) Internet Control Message Protocol is a basic network scanning technique used to determine which range of IP Addresses are mapped to live host computers. As cracking tools become more popular and increase in number, this trend is likely to continue. Network probes are technically not intrusions but should not be taken lightly. (M.Rouse, 2005)

A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services are associated with each well-known port number the computer provides. Port scanning, a favorite approach or computer crackers, gives the assailant an idea where to probe for weakness. Essentially, a port scan consist of sending a message to each port, one at a time. The kind of response received indicates whether a port is used and can therefore be probed for weakness. (M.Rouse, 2005)

In ping sweeps a large range of IP Addresses send a set of ICMP Echo packets to a computer system to find out which ones will react to the ping. Ping sweeps are used legitimately by the Network Administrator to find out which machines are alive for diagnostic reasons and detect any vulneralability in the companies computer system. (Theo, 2000)

Tools used for conducting ping sweeps are fping that sends one packet to one IP Address then proceeds to the next address, showing the IP Address ranges alive on the network. This is important information to the Network Administrator because it...