week1 case study - Alireza Ghoorchian Case study week 1...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Alireza Ghoorchian Case study week 1 Protecting our virtual files and computer should be a top priority when new security risks are discovered everyday. Port scanning is one threat that is seen today. This could happen whether you are realizing it or not. Securing yourself from malicious people will protect you from port scanning. In computing, a ping sweep is a technique used to determine which of a range of IP addresses map to live hosts. It consists of ICMP ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. A ping is often used to check that a network device is functioning. To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources. However, ICMP TIMESTAMP and ICMP INFO can be used in a similar manner. 1. Reliability - Publicly available (best of class / breed) PKI offerings are relatively well-tested and robust, having been forged in the fires of competitive public markets. Contrasted with internally developed PKI solutions, public
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/24/2011 for the course COMP 100 taught by Professor Dfgdegg during the Spring '08 term at DeVry Chicago O'Hare.

Page1 / 4

week1 case study - Alireza Ghoorchian Case study week 1...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online