Anti Essays offers essay examples to help students with their essay writing.

Sign Up

Ping Essay

Open Document

Below is an essay on "Ping" from Anti Essays, your source for research papers, essays, and term paper examples.

Ping sweeps and port scan
Thesis Statements: In this paper I will talk about the danger that we are facing day by day from hackers and we will talk about two common network probes called Port scan and Ping Sweeps and how to protect ourselves from hem.
Technology has changed a lot with in past teen years, there is much more important information on the web and on the clouds such as personal information, company or business documents, all of our financial records and many more, and there are many unethical people out there that are trying to take an advantage of these great technology’s and still from others! Network probes are very easy ways to detecting intrusions. And unfortunately this is a very common issue, if you ask many system administrator that runs a big or huge network can tell you that they had the same issue and that their network has been probed before. Network probes are actually not intrusions by them self but eventually they might lead to actual intrusions and they should not be taken lightly! There are two popular and common network probes and I will explain them in more detail. They are Port Scans and Ping Sweeps.
Port scan is probably one of the most common network probes; A port scan helps to discover the services that are currently running on the target computer, also identify and finds the open ports that are available on the a network or computer. This technic could be used by some people or hackers to target their victims. This is very similar to a thief that wants go to a house for burglary, usually the thief will look all around the house to find an open door or window to get in and port scan is very similar just instead of door or windows, there are ports of every individual computer or server. Port scan is usually very easy to perform; all the intruder has to do is to connect to series of ports on the computer and find out which ports are open and close so he can plan his attack. There are many types of port scans such as sweep (will...

Show More


MLA Citation

"Ping". Anti Essays. 15 Dec. 2018


APA Citation

Ping. Anti Essays. Retrieved December 15, 2018, from the World Wide Web: http://parimatch-stavka7.com/free-essays/Ping-320580.html

dataup.tv | قصير | Watch now