Computer and Network Security - PDF

Added on - 21 Apr 2020

  • 9

    pages

  • 2304

    words

  • 6

    views

  • 0

    downloads

Showing pages 1 to 3 of 9 pages
Running Head: COMPUTER AND NETWORK SECURITYComputer and Network Security[Name of the Student][Name of the University][Author note]
COMPUTER AND NETWORK SECURITY1The descriptions of the methodology for Penetration Testing are given below:Footprinting:The possibility of success for penetration test exercises increases when more informationare gathered can be understood very easily.Footprinting can be defined as one part of the part of information gathering for penetrationtesting. The footpirnting is mainly performed so as to gather the maximum amout of informationthat is available about the targeted system that is going to be built (Stepien Peyton and Xiong2012). Many free tools are available in market and this includes tools like whois, spiderfoot andmany more. Along with this there are also other tools that are available in the Kali Linux Distro.The penetration testers are able to gather a lot of information which are confidential aswell a very important. They probe the target system and they stay invisible as well. This phaseshould be used as much as possible and along with this new ideas should be created for theidentification of various loopholes.Scanning and Enumeration:After the completion of the Footprinting process, we can move into the process ofscanning and enumeration. This phase mainly covers certain aspects like the identification of theonline system, finding of open or filtered ports, what are the services which are running on whatand on which number port, identification of the type and version of the operating system, rules ofrouting and firewall and many more.During the port scanning process one thing that is to be taken into note is that whateverthe tool that is being used, it can have high chances of involving a lot of active proving of the
COMPUTER AND NETWORK SECURITY2targeted system. Nmap is one of the famous free port scanner tool (Gillani et al. 2015). This canbe used in both windows as well as on the linux systems due the fact that it is a cross platformsoftware.After identification of the open ports we are capable of using the services and the OSfingerprinting tool. This tool can be used for identifying the open port servces. Some of thefamous OS fingerprinting tools are Httprint, Amap and many more.Denial of Service AttackOnce the attempt of penetration is done there are two possible outcomes. This outcomesinvolves successful penetration and the second one is failure in penetration. Now we are going todiscuss about the after effects of failed penetration testing.When the penetration fails, then there still remains the possibility of a DOS attack by theattacker. DOS attack or denial of service attack can be defined as an attempt made by theattacker so as to make a service become unavailable to the right user or may to system failure.Once a system is attacked by the DOS attack then the whole system would be flooded bythe activities of the attacker associated with unavailability of service for normal users (Jia Hongand Kim 2015). This is ultimately result in disruptive service, dissatisfaction amongst the usersand huge losses in case if the system is associated with making money.The most popular attack amongst the DOS attack is the DDOS or distributed denial ofservice attack. This is the most powerful type of attack due to the fact that many systems areattacked at the same time. Some of the commonly known DDOS attacks are listed below:
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document