Preview

IS3220 Project Network Survey Chris Wig

Powerful Essays
Open Document
Open Document
1578 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3220 Project Network Survey Chris Wig
IS3220 Project Network Survey
Chris Wiginton, Jose Rosado
ITT Technical Institute, Tampa FL
Instructor: Sherman Moody
10 October, 2014

Besides the basic physical security of a site, the next most important aspect is controlling digital access into and out of the organization’s network. In most cases this means controlling the points of connectivity to the outside world, typically the Internet. Partitioning the boundary between the outside Internet and the internal intranet is a critical security piece. Any services not actually needed should be turned off so that they will not become avenues of attack for security threats. Different systems will have different services running by default. The firewall process can tightly control what is allowed to traverse from one side to the other. As with most aspects of security, deciding what type of firewall to use will depend upon factors such as traffic levels, services needing protection and the complexity of rules required. The difficulty for firewalls is distinguishing between legitimate and illegitimate traffic. Firewalls, if configured correctly, can be a reasonable form of protection from external threats including some denial of service (DOS) attacks. If not configured correctly they can be major security holes in an organization. The most basic protection a firewall provides is the ability to block network traffic to certain destinations. This includes both IP addresses and particular network service ports. Many network devices and computer hosts startup network services by default, each of these services could represent an opportunity for attackers, worms and Trojans. Very often all of these default services are not needed. Doing port lockdown by turning off services reduces this exposure. A port scan of Corporation Tech’s network provided the results listed in the table below.

PORT
PROTOCOL
STATE
SERVICE
25
TCP
CLOSED
SMTP
80
TCP
OPEN
TCP Wrapped
139
TCP
OPEN
netbios-ssn
1900
TCP
OPEN
TCP



References: Gibson, S. (n.d.). GRC | Port Authority, for Internet Port 139  . Retrieved October 10, 2014, from https://www.grc.com/port_139.htm Gibson, S Gibson, S. (n.d.). GRC | Port Authority, for Internet Port 80  . Retrieved October 10, 2014, from https://www.grc.com/port_80.htm Gibson, S Network Printer Ports. (2003, March 28). Retrieved October 10, 2014, from http://technet.microsoft.com/en-us/library/cc728404(v=ws.10).aspx networking - Is port 139 still vulnerable? - Server Fault Port 5357 TCP on Windows 7 professional 64 bit? - Super User. (2009, October 18). Retrieved October 10, 2014, from http://superuser.com/questions/56781/port-5357-tcp-on-windows-7-professional-64-bit Port 62078 (tcp/udp) :: SpeedGuide.net Port 6839 (tcp/udp) - Online TCP UDP port finder - adminsub.net. (2014, August 26). Retrieved October 10, 2014, from http://www.adminsubnet.net/tcp-udp-port-finder/6839 Port 7435 (tcp/udp) - Online TCP UDP port finder - adminsub.net Port 9110 (tcp/udp) :: SpeedGuide.net. (n.d.). Retrieved October 10, 2014, from http://www.speedguide.net/port.php?port=9110 TCP 9500 - Port Protocol Information and Warning! (n.d.) Vaughan-Nichols, S. (2013, January 30). How to fix the UPnP security holes | ZDNet. Retrieved from http://www.zdnet.com/how-to-fix-the-upnp-security-holes-7000010584/ Wilson, C

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. What is the destination port for the DNS query message? What is the source port…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    I would recommend that we use a "Defense in Depth" strategy, having multiple layers of access protection. We need to have an IDS/IPS on both sides of our edge firewall. The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks. We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring. Our web server and mail server should be completely separated from the rest of our network in a de-militarized zone (DMZ). We need to have a network firewall between our DMZ and our internal network, between the outside world and our internal network, and between our DMZ and the outside world.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    For the systems/application domain, we must strengthen our servers. This will be done by shutting off access to unused ports and services. This will provide less ways onto our system. Our servers must have the latest patches and…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1230

    • 905 Words
    • 6 Pages

    Why can you not simply leave Windows Firewall turned off when you deploy an actual web server?…

    • 905 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This indicates the service uses a TCPwrapper. This is a host based network in ACL system used to filter Internet Server Protocols provides firewall features.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6. The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe…

    • 440 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ping sweeps and Port scans are a great security tool for businesses. Ping sweeps are used to find someone on the end of a network and Port scans are then used to find a way into that end of the network. Once a perpetrator gets in there is no telling what harm could be done. These techniques can also be used for troubleshooting issues that can arise inside the company. It is in the company’s best interest to be aware of ping sweeps and port scans to help from devastating consequences later on.…

    • 434 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ping Sweeps

    • 685 Words
    • 3 Pages

    Port scanning is one of the most popular techniques attackers use to discover services they can break into. All machines connected to a Local Area Network or Internet run many services that listen at well-known and not so well known ports. A port scan helps the attacker find which ports are available. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. Typical ports scans can show up in system logs. A…

    • 685 Words
    • 3 Pages
    Good Essays
  • Good Essays

    CN ASS 3

    • 867 Words
    • 7 Pages

    Python, how to create a socket, bind it to a specific address and port, as well…

    • 867 Words
    • 7 Pages
    Good Essays
  • Best Essays

    Deering, S., Hinden, R. (1998). Internet Protocol, Version 6 (IPv6) Specification. RFC 2460. Retrieved from: http://tools.ietf.org/html/rfc2460…

    • 2617 Words
    • 11 Pages
    Best Essays