+1-415-670-9189
info@expertsmind.com
Protect the system from these procedural attacks
Course:- Computer Network Security
Length:
Reference No.:- EM13885556




Assignment Help
Assignment Help >> Computer Network Security

Q To protect the system

The typical behaviours of Internet intruders include information gathering, target systems scanning, back-door opening and log-file clean-up. A system administrator needs to have the tools, knowledge and experience to protect the system from these procedural attacks. In this Discussion, you will analyse hacker behaviour.

For information on information gathering, you can use any information-gathering service like Metagoofil, FerretPRO or free tools from Dogpile (InfoSpace, 2014) to search IRC, Usenet, email and file databases. For information on target system scanning, you can use a resource like the Nmap.Org (n.d.) site, the Northwest Performance Software (2014) site, nbtstat in Win2K or the tools discussed in last week's project.

References:

InfoSpace. (2014) Dogpile [Online]. Available from: http://www.dogpile.com/ (Accessed: 3 August 2014).

Nmap.Org. (n.d.) Nmap security scanner [Online]. Available from: http://nmap.org/ (Accessed: 3 August 2014).

Northwest Performance Software. (2014) Networking software [Online]. Available from: http://nwpsw.com/ (Accessed: 3 August 2014).

To complete this Discussion:

Post: Summarise the procedures and tools hackers use for information gathering, target systems scanning, back-door opening and log-file clean-up. Alternatively, give an account of a hacker story from a technical perspective, including the tools employed.

Answered:-

Verified Expert


Preview Container content

The attack of a hacker is not a simple procedure, rather is a complex procedure that include access to a remote computer, permission of root administrator, utilization of virtual probes, and spying method. In the present context, the focus of the report is based on the procedures and tools that a hacker use for information gathering, scanning of the target system, back door opening, and cleaning of the log file.

Tools such as Whois, Nslookup, and Matagoofil are useful for gathering basic information. The objective of such procedure is collecting information from the target sources using publically available tools (Johnsen & Kristoffersen, 2014).




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be intro
List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which
Servers, administrative and support users 2 subnets with 50 hosts for faculty & student labs 10 or more WAN links for point-to-point home office address. Design the subnet?
Demonstrate factual knowledge, understanding and the application of principles of ethics to ICT-related issues and demonstrate depth of analysis by examining arguments for one
The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educa
Some commentators have suggested that mainframe computer systems could be squeezed out of existence in the next few years, with the incredible advances in the capabilities o
Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down it
SIT704 - Advanced Topics in Digital Security - Perform security exploits on web applications and websites and you may choose to use WebGoat and any appropriate tools from the