Preview

Unit 3 Assignment 1: Choosing Port Scanning

Satisfactory Essays
Open Document
Open Document
216 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 1: Choosing Port Scanning
Unit 3 Assignment 1
Choosing Port Scanning
1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports. 2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.
3. Nmap (Zenmap) is open source port scanning software that I would prefer.
4. As the software recommender for the company I would have to recommend Nmap to the Senior Administrator. Features of Nmap is that it is useful for performing tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    5. Which network support services team identifies whether the client site has existing network hardware and circuits installed?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans, like I stated earlier, are used to discover what services are running on a certain machine. Each service offered by our servers makes user of ports by which TCP/IP requests are sent. Hackers use this information to determine what types of vulnerabilities they can use; this is why the only ports that are open are the ones that we are using. By keeping all other ports closed this keeps hackers from opening other unnecessary openings.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Port scanner is the software program created and designed to probe a server or host for open ports. This is often run and used by administrators to acknowledge security policies of their networks and for attackers to identify running services on a host with the view to compromise it.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 424 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking…

    • 838 Words
    • 4 Pages
    Better Essays
  • Good Essays

    To better comprehend the danger that ping sweeps and port scans can represent here is a more detailed explanation of each of these techniques.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Refining Solutions

    • 947 Words
    • 4 Pages

    A program that allows people to see how computers on the network are running, allowing the opportunity for regular maintenance on systems. There is also the ability to contact a professional immediately and have help with any possible problems that might be at hand.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Mixed Economy

    • 499 Words
    • 2 Pages

    The Information Technology industry has been a big part and demand in every industry that needs and requires technical support, especially in most businesses that rely on computer networks. Whether small, medium or large companies’,…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    During my research I came upon four different programs that I thought would meet our criteria. I will explain which one I believed was the superior choice and then explain what led me to that conclusion. I have included a table listing the top four in the reference pageThe software that I believed was the best fit for us is Netviewer Meet 6.0. My criteria that my decision was based on were: Features, Usability, Security, Support, Price and Trial availability. I will explain my choice based on two of them, features and price.…

    • 664 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking Tools

    • 351 Words
    • 2 Pages

    Packet sniffers like Wireshark, Cain and Abel, dSniff can be used to sniff IP packets sent over your network. These tools can be used to monitor network traffic which is a good thing for your administrators. But it could also be used to let hackers know of the information being exchanged within in your network and also your internet traffic. These can be valuable tools to help show vulnerabilities within your network.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Antivirus software performs many functions to prevent infection and remove malicious logic that has infiltrated a computer system. Scanning email prior to download can ensure that there is no unwanted code in email attachments. Periodically scanning computer files can also help antivirus software isolate any viruses that have…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    This assignment intends to give you the opportunity to investigate the computer systems and network components of a company. Not only this assignment let you explore the technology needs by the company, but also let you know how to provide solution based on the requirements and its benefit versus cost.…

    • 619 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ports are an important form of infrastructure in Indian economy. They play a vital role in facilitating international trade and commerce by providing an interface between the ocean transport and land-based transport. India has an extensive coastline of about 7517 km spreading on the Western and Eastern shelves of the mainland as well as along the Islands. It has a well-established port infrastructure covering 12 major ports and 200 minor/intermediate ports (non-major ports), spreading across 9 coastal…

    • 12896 Words
    • 52 Pages
    Powerful Essays
  • Powerful Essays

    The paper concludes with the estimations and comparisons to port having similar characteristics. Finally, it discusses policy implications resulting from the research findings.…

    • 6615 Words
    • 27 Pages
    Powerful Essays