Reference no: EM133787918
Problem: Enumeration + Network Design
I. Scanning is the process of actively connecting to a system to get a response and gather information. Through scanning, you can determine live hosts, open ports, operating systems in use, running services or processes, implemented patches, and firewalls. Describe in detail three scanning tools you are familiar with. Discuss under which circumstances each tool is appropriate and the type of information it provides. Use examples.
II. Carol is a network administrator for a small company that provides online services to its customers. She is responsible for maintaining the security and performance of the company's network, which consists of several servers, routers, switches, and computers. She also has to deal with various internet threats, such as malware, denial-of-service attacks, and unauthorized access attempts.
Dave is a cybercriminal who wants to exploit the company's network and steal valuable data, such as customer information, financial records, and trade secrets. He scans the network for open ports, vulnerabilities, and misconfigurations, hoping to find a way to bypass the security measures and gain access to the servers.
How can Carol use a firewall to protect the company's network and data from Dave's attacks? What are the benefits and drawbacks of using a firewall in this situation? How can Carol configure and manage the firewall to meet the company's needs and policies?