+1-415-670-9189
info@expertsmind.com
Protect the system from these procedural attacks
Course:- Computer Network Security
Length:
Reference No.:- EM13885556




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Q To protect the system

The typical behaviours of Internet intruders include information gathering, target systems scanning, back-door opening and log-file clean-up. A system administrator needs to have the tools, knowledge and experience to protect the system from these procedural attacks. In this Discussion, you will analyse hacker behaviour.

For information on information gathering, you can use any information-gathering service like Metagoofil, FerretPRO or free tools from Dogpile (InfoSpace, 2014) to search IRC, Usenet, email and file databases. For information on target system scanning, you can use a resource like the Nmap.Org (n.d.) site, the Northwest Performance Software (2014) site, nbtstat in Win2K or the tools discussed in last week's project.

References:

InfoSpace. (2014) Dogpile [Online]. Available from: http://www.dogpile.com/ (Accessed: 3 August 2014).

Nmap.Org. (n.d.) Nmap security scanner [Online]. Available from: http://nmap.org/ (Accessed: 3 August 2014).

Northwest Performance Software. (2014) Networking software [Online]. Available from: http://nwpsw.com/ (Accessed: 3 August 2014).

To complete this Discussion:

Post: Summarise the procedures and tools hackers use for information gathering, target systems scanning, back-door opening and log-file clean-up. Alternatively, give an account of a hacker story from a technical perspective, including the tools employed.

Answered:-

Verified Expert


Preview Container content

The attack of a hacker is not a simple procedure, rather is a complex procedure that include access to a remote computer, permission of root administrator, utilization of virtual probes, and spying method. In the present context, the focus of the report is based on the procedures and tools that a hacker use for information gathering, scanning of the target system, back door opening, and cleaning of the log file.

Tools such as Whois, Nslookup, and Matagoofil are useful for gathering basic information. The objective of such procedure is collecting information from the target sources using publically available tools (Johnsen & Kristoffersen, 2014).




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Why should you periodically change the key used to encrypt messages? What attack is more likely to succeed if a key has been used frequently? How frequently should the key b
What is the ciphertext (in binary form) generated by the encryption of the character R? (Please show your work.) How is the plaintext for this encrypted R recovered? (Please s
What is cyber security, and what are some of its key concepts and what are the most significant threats to your data, and what are some of the root causes of those threats - a
Identify the three different kinds of access control, which one most resembles a Windows OS environment, military. What are the three authentication factors. Provide an exampl
Why would a variation of RSA encryption/decryption where a single prime number is used the modolus insecure? How can someone recover a message x from the encrypted value.
Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy
BN203: Network Security/Overview of Network Security Identify three (3) security vulnerabilities in the chosen case study and discuss how these threats can be mitigated using
Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clic