How hackers can penetrate networks through open ports

Assignment Help Computer Networking
Reference no: EM133954768

Assignment:

You have been asked to investigate how hackers can penetrate networks through open ports. Each of you should do the following:

1. Do some research about the dangers of open ports to network security. Here's an article on just what ports are and why they are important: What are Ports?

2. Run the IP Scanner Port Scan on your computer and summarize what you find. Before you run the scan, you will need to select package and then from the pull down menu select Basic. Then click on Scan. Hopefully the scan will tell your that your ports are filtered, so your IP address is not public. Be sure to read the info below the scan area - it should help you understand the importance of secure ports.

3. Then, send me a report in Word (or a Google Doc) and send it to this Drop Box, telling me what you discovered about open ports, what the T1 Shopper scans told you about the computer you tested, and make recommendations for how best to secure the ports on a home network.

Reference no: EM133954768

Questions Cloud

Minimum of two vulnerabilities that may be found in windows : Please describe a minimum of two vulnerabilities that may be found in a Windows, Linux, and Mac system?
What are consequences of brexit : What are consequences of Brexit? Why Brexit vote was actually a vote for hard Breixt. Survey shows that after two years Britons don't take it easy.
Differences between public police-private security officers : What are the major legal differences between public police and private security officers?
What are some of network security concerns with web browsers : What are some of the Computer and Network Security concerns with Web browsers and what can be done to secure them?
How hackers can penetrate networks through open ports : You have been asked to investigate how hackers can penetrate networks through open ports.
What are others using to measure siem effectiveness : What are others using to measure SIEM effectiveness, and ways would you prove your SIEM implementation is effective?
Why is a sql injection so detrimental to a company : Why is a SQL injection so detrimental to a company? What are the various types of SQL injection?
What characteristics make a good incident response team : What characteristics make a good incident response team? Pick one of the roles of a team member and discuss what it takes for them to be effective.
What is the most popular ransomware in history : Find example names of different types of viruses? Choose few such as polymorphic, boot and multipartite viruses? What is the most popular ransomware in history?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd