Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module

Writing about Jazz music history Describe the racial and social stratification of New Orleans in the late 1800s and early 1900s.
March 24, 2021
A client with schizophrenia is receiving antipsychotic medication. Which nursing diagnosis may be appropriate for this client?
March 24, 2021

Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module

Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module

2. How can the attacks you have described be detected and prevented?
Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) covered in Module 2. Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.

ANSWER # 1
B. Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) covered in Module 2. Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.
In last week’s module titled The Preattack Phases, several methods were discussed regarding how Nmap scans a network to determine if ports are open. One of the methods known as the SYN stealth scan involves sending a packet to a host and then failing to respond to the host’s SYN/ACK. This scan is also known as a half-open scan and is considered stealthy because a connection is never established (UMUC, 2012). Since a connection never occurs, this type of scan is less likely to be logged and detected. The process of establishing half-open connections to detect open ports can also be used against a host to cause a Denial of Service (DoS). A SYN flood attack causes a DoS by flooding a network device with SYN requests and not responding to the host’s SYN/ACK response. The objective for performing this type of DoS attack commonly involves extortion, espionage, or protesting (Dambala, 2011). According to Prolexic’s Quarterly Global DDoS Attack Report (2013), SYN floods comprise approximately one-third of all reported DoS attacks. This level of SYN flood attacks represents the highest volume for any single attack type since Prolexic began publishing its Quarterly Report.
Denial of service attacks such as SYN floods are a common disruptive technique that many organizations experience today. The organizations that are affected by these types of attacks vary across a spectrum of industries that include financial, retail, healthcare, and media. The following actions are some countermeasures that organizations can employ to mitigate this type of attack:


 

smilesmilePLACE THIS ORDER OR A SIMILAR ORDER WITH CHEAP NURSING TUTORS TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper






The post Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module appeared first on Cheap Nursing Tutors.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Buy Custom Nursing Papers