Question

In: Computer Science

General Questions about Network Footprinting Guidelines Answer each of the following questions using knowledge gained from...

General Questions about Network Footprinting

Guidelines

  • Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web. Answer all questions in full graduate-level sentences and paragraphs.

1. What is accomplished by network footprinting?

2. What are the countermeasures a network security architect can set in motion to diminish the threat from network footprinting?

3. What is the difference between network footprinting and network reconnaissance?

4. In the context of network security, explain what is meant by after reconnaissance comes penetration.
5.  What is a denial of service (DOS) attack?

Solutions

Expert Solution

Answer 1 :

Network Footpring is a process of gathering all the useful information about the target network . Network footprinting is considered first step to attack where the attacker learns as musch as possible about the taerget so that he finds a way to break into the system .

Attackers use footprinting to collect various information through Active (Direct footpring) or Passive (Indirect footprinting) .

These may be :

  • Domains , Sub domains , IP addresses , DNS records .
  • Server Locations , user password , Operating system information.
  • Employee informations , Locations , phone numbers , eployees back grunds etc .

The main aims of footprinting are :

1. Learn security postures .

2. Analyse the security of the target system .

3. Find loopholes and create an attck plan.

4. Find vulnerabilities and collect information about target security .

5. Identify attack areas using different tools and techniques .

Answer 2 :

Countermeasures : It is an action , a procedure or a method that reduces a threat or an attack by eliminating or preventing it using various tools and techniques of network security . Some of the footprinting countermeasures that an architect should set are :

1. Restrict accessing to social media.

2. Enforcing Security Policies.

3 . Educating employees about security threats .

4. Encrypting Sensitve information.

5. Disabling protocols that are not required.

6. Proper Service Configuration .

Answer 3 :

Difference between network footprinting and network reconnaissance :

When weare talking about Reconnaissance and footprinting , there is no difference beteween them as such . Footprinting is a part of reconnaissance which is used for gathering information about the target system. Reconnaisance is further divided into three phases , i.e , 1. Footprinting. 2. Scanning. 3. Enumerating

During Reconnaissance the hacker attempts to gather information in the following Seven steps mentioned below :

1. Gather Initial Information

2. Determine the network range

3. Identify active machines

4. Discover open ports and access points

5. Fingerprint the operating system .

6 . Uncover service on ports

7. Map the network

During FootPrinting the hacker attempts to gather the following information from the target system :

1. Domain Names

2. IP addresses

3. Namespaces

4. Employ Information

5. Phone numbers

6. E mails

7 . Job Information

The above mentioned points can be cosidered differences between the two .

Answer 4 :

After reconnaissance comes penetration means that at this stage the hacker wants to learn what is on the other end . The aim of this is to discover the IP address of host on target computers , operating system of the target computer and accessible UDP and TCP ports on the target computer so that it can be easy to penetrate during the ateck by a hacker. as a result Reconniassance makes it easier for pentration to take place thus , pentration comes after reconnaissance.

Answer 5 :

DoS attack : In this atteck the attacker attempts to distrupt the flow of traffic in a network by flooding the network with the messages so that the network gets difficulty in processing its routine messages from the authorized users. The hacker may perform this by flooding web server , mail server etc with incoming messages.

Denial Of Service attack is an attack targeting the availibility of web applications . Unlike other attacks the DoS targets not on the stealing of the information but slowing down the work or taking down the taergeted website. This attack can be performed for various reasons ranging from simple fun to financial gain.

DoS attacks affects the enterprises from all sectors , ranging from private to government , all sizes and all locations. They target the network layer upto the application layer , where attacks are more difficult to detect as they get confused with heavy traffic over the network.


Related Solutions

Answer the following questions from you knowledge in microeconomic theory: A.      Show, using only the industry...
Answer the following questions from you knowledge in microeconomic theory: A.      Show, using only the industry demand and long-run supply curves (for an increasing cost industry), the effects on price and output of an excise subsidy paid to the firms. Who benefits from the subsidy? B.      Can you think of any type of subsidy that, if given to firms in a competitive market, would in the long run benefit (the owners of) the firms? Why wouldn’t entry of new firms...
1. Answer the following questions about the pancreas. (a) What is the general role of the...
1. Answer the following questions about the pancreas. (a) What is the general role of the pancreas in digestion? (b) When does the hepatopancreatic duct open? (c) What would you guess is the reason that many of the digestive enzymes produced by the pancreas are released as zymogens, rather than as fully functional enzymes? 2. Answer the following questions regarding the large intestine. (a) What is the main substance absorbed from the large intestine? (b) What do you consider the...
* From your knowledge about DNA microarray, answer the following: E- Using your own words, describe...
* From your knowledge about DNA microarray, answer the following: E- Using your own words, describe the color pattern outcome resulted at the end of the expression microarray experiment ?(2%) F- If the expression microarray experiment was done with a normal sample and a suspected sample, after reading the color pattern resulted from the experiment it was recorded that “gene A22” is not expressed in the suspected sample. The gene A22 is expressed in all cells of the body but...
Answer each of the following questions with your best psychological knowledge of personality. For full credit,...
Answer each of the following questions with your best psychological knowledge of personality. For full credit, answers should be of 5 to 6 lines ( 3 points each) a. Why do researchers use control groups in experiments? b.What is ambulatory assessment?
1. Answer the following questions from your knowledge in microeconomic theory: The following quote was taken...
1. Answer the following questions from your knowledge in microeconomic theory: The following quote was taken from a letter printed in Ann Landers’s column: Dear Ann Landers: I am a hairdresser who wishes to speak my piece. My remarks are for the women who think they are paying too much for a haircut. The reason haircuts are rather costly these days is because so many people are cutting their own hair and others wait three months between haircuts. A)      Do...
-Which of the following is true about general knowledge? It is not excludable but rival in...
-Which of the following is true about general knowledge? It is not excludable but rival in consumption. It is both excludable and rival in consumption. It is neither excludable nor rival in consumption. It is excludable and not rival in consumption. -As a result, private firms Would/Would not undertake the efficient amount of basic scientific research. -Which of the following policies has the United States adopted in response to this problem? Check all that apply. Subsidizing research through the National...
Answer the following questions: Question 1: Using your knowledge of the college environment, determine the functional...
Answer the following questions: Question 1: Using your knowledge of the college environment, determine the functional dependencies that exist in the following table. After determining the functional dependencies convert this table to an equivalent collection of tables that are in third normal form. Student (StudentNum, StudentName, NumCredits, AdvisorNum,AdvisorName, DeptNum, DeptName, AdvisorNum, AdvisorName, DeptNum, DeptName, (CourseNum, Description, Term, Grade)) : Draw an ERD for the case given in Question 1.
Using your knowledge of Commanding Heights and answer the following questions: (please type them) a) What...
Using your knowledge of Commanding Heights and answer the following questions: (please type them) a) What is the difference between the economic philosophy of Keynes and the economic philosophy of Von Hayek? b) What politicians supported the views of Hayek? c) What politicians supported the views of Keynes?
Answer the following questions. Assume each question is independent from the last. Please type using a...
Answer the following questions. Assume each question is independent from the last. Please type using a word processing program and bring a printed copy to class. Write as much or as little as you feel necessary to answer each question to the best of your ability. You may use all available resources to complete this case – e.g., lecture slides, notes, your book, and the Accounting Standards Codification. Collaboration with others in your group is allowed to the extent that...
In about 200 words (total), answer the following questions In general, what is the required accounting...
In about 200 words (total), answer the following questions In general, what is the required accounting treatment for research and development costs?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT