Week_1_Assignment

Week_1_Assignment - Week 1 Assignment Analysis and report...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Week 1 Assignment Analysis and report for ping sweeps and port scans. SEC280 As ping sweeps and port scans are nefarious activities, I will attempt to display the need for security and the severity of the threat at hand. In this memo I will explain what each of the intended activities is meant to do, what can be done to stop them, and how severe these types of threats are. I will also attempt to calm any fears associated with these types of activities as they are just the beginning of a possible, larger threat. Ping Sweeps are network probes. They send a set of ICMP(Internet Control Message Protocol) ECHO packets to a network of machines and see which ones respond. (Teo, 2000) This is like going from door to door in any neighborhood and finding out who is home and what they are or are not doing. For example, they would send this type of probe to listen for possible vulnerable connections to then sneak in through. This would allow backwards entry into that computer through the open, respondent port.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Port Scans are yet another way of listening for an opening. This is done by
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

Week_1_Assignment - Week 1 Assignment Analysis and report...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online