Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module
2. How can the attacks you have described be detected and prevented?
Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) covered in Module 2. Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.
ANSWER # 1
B. Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) covered in Module 2. Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.
In last weekÃ¢â‚¬â„¢s module titled The Preattack Phases, several methods were discussed regarding how Nmap scans a network to determine if ports are open. One of the methods known as the SYN stealth scan involves sending a packet to a host and then failing to respond to the hostÃ¢â‚¬â„¢s SYN/ACK. This scan is also known as a half-open scan and is considered stealthy because a connection is never established (UMUC, 2012). Since a connection never occurs, this type of scan is less likely to be logged and detected. The process of establishing half-open connections to detect open ports can also be used against a host to cause a Denial of Service (DoS). A SYN flood attack causes a DoS by flooding a network device with SYN requests and not responding to the hostÃ¢â‚¬â„¢s SYN/ACK response. The objective for performing this type of DoS attack commonly involves extortion, espionage, or protesting (Dambala, 2011). According to ProlexicÃ¢â‚¬â„¢s Quarterly Global DDoS Attack Report (2013), SYN floods comprise approximately one-third of all reported DoS attacks. This level of SYN flood attacks represents the highest volume for any single attack type since Prolexic began publishing its Quarterly Report.
Denial of service attacks such as SYN floods are a common disruptive technique that many organizations experience today. The organizations that are affected by these types of attacks vary across a spectrum of industries that include financial, retail, healthcare, and media. The following actions are some countermeasures that organizations can employ to mitigate this type of attack:
. TODAY AND GET AN AMAZING DISCOUNT
The post Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module appeared first on Term Paper Tutors.