Saturday, January 19, 2019

Ping Sweeps and Port Scans Essay

Recently, it was brought to my attention that at that place atomic number 18 c at a timerns ab let out some(a) activities on the interlock that can be considered less than trustworthy. Specifically, the concerns ar regarding meshing traffic called tap pass overs and demeanor descrys. Im putting unneurotic this paper to explain how pick apart sweeps and port scans impact our network traffic. starting line we must bring in what these two things do before we can understand how they are used to impact a network. Ill start with criticize sweeps. A pink sweep is a signal that is sent to a range of instruments on a network to simply see if there is a reply back. This is done via an ICMP Echo request that is sent to distributively utensil.The ICMP Echo request is a signal sent out to an IP address requesting an answer back. More commonly known as a ping. The ping volition wait for a response from any machine that is using the IP address specified in the ping and will let the person sending the ping know if the port the machine is using on the network is open or not.The ping sweep takes the ping to the next level as it will send these pings out to a large range of IP addresses requesting responses back. It lets the person sending the ping sweep know what machines are alive and what machines are off. It is an easy focus for a less than scrupulous person to discover where they might be able to start an onslaught at.But please understand that ping sweeps are not just used by intruders trying to resolve our network or other nefarious actions. Ping sweeps are excessively utilized by our own networking personnel for use in troubleshooting issues on the network. Its is also used in resolving licensing issues as well. So not all ping sweeps are bad for the network.Port scans are a animal that takes ping sweeps to the next level. The goal of a port scan is to actually see a machine on the network by probing for machines. Of course, the machine must be provi de on for the port scan to find it. When it does find a machine that is powered on, the port scan will start getting to work.The port scan will scan for a port on the machine once its find one. It will then determine what services are running on the port that its discovered. This is important to the intruder because it gives them the study they need to take over the machine running on the discovered port. The risk to our network from Ping sweeps port scans is minimal. We have several tools at our disposal that are currently acting to hold back external ping sweeps and port scans from intruding on our network.The biggest protection we currently have in place is our hardware and packet firewalls. They are configured to help block incoming echo requests and protect unauthorized intrusions on our machines. With that being express though, we must always work with the assumption that we are vulnerable to attack. This is because each day somebody somewhere is trying to figure out a w ay to get past the current protection technology that is in place. No network on the planet is completely locked down from intrusion and there is no exception. Education is also the key to staying protected against intrusions. automate updates are in place on all our security software so that we continue to stay up to date with our security patches. act our education of the employees within the company on network security by providing the latest readings on threats or via monthly newsletters will also continue. This, I believe, will provide the heightened awareness desired and protect our information stored or shared on our network.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.