ITT-111-SAvilaTopic4Assignment2
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
121
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by CoachExplorationApe24
Network Reconnaissance and
Troubleshooting
Network reconnaissance is the process of gathering information about a target network in
order to identify potential vulnerabilities and weaknesses.
This
is an essential step in any
successful cyber-attack, as it allows the attacker to gain a better understanding of the target's
infrastructure and security measures. There are several methods that can
be used
for network
reconnaissance, including passive and active scanning techniques. Passive scanning involves
monitoring network traffic and analyzing data packets to identify potential targets, while active
scanning involves sending probes or requests to specific IP addresses or ports. The information
gathered during network reconnaissance can
be used
to launch a variety of attacks, including
denial-of-service attacks, phishing scams, and malware infections. It is therefore crucial for
organizations to implement strong security measures that can detect and prevent these types of
attacks.
Overall, network
reconnaissance plays a critical role in modern cyber warfare. By
gathering intelligence on potential targets, attackers can launch more effective and devastating
attacks that can cause significant damage to businesses and individuals alike.
Troubleshooting is the process of identifying and resolving problems that arise in any
system. It is an essential skill that every
individual
should possess, as it helps to maintain the
smooth functioning of any system. Troubleshooting requires a logical approach, patience, and
attention to detail. The first step in troubleshooting is to identify the problem.
This
involves
gathering information about the symptoms and analyzing them to determine the
root cause
. Once
the problem
has been identified
, the next step is to develop a plan of action.
This may involve
testing various components or running diagnostic tools to isolate the issue.
The final step in
troubleshooting is resolving the problem.
This
may
involve
repairing or replacing faulty
components or adjusting settings on a device or system. The key to successful troubleshooting is
persistence and perseverance until a solution
has been found
. In conclusion, troubleshooting is an
important skill
that can be applied in various fields such as technology, medicine, engineering,
and much more.
Fing
Day
Monda
y
Tuesd
ay
Wednes
day
Thursd
ay
Frida
y
Saturd
ay
Time
1 #
of
Hosts
11
13
17
15
14
12
Time
14
12
16
15
12
13
2 #
of
Hosts
Time
3 #
of
Hosts
13
12
16
14
14
12
Fing is an application used to scan the current network a device is connected to. It scans
how many devices are using the network, what their IP address is, and their host names. Within
the Fing application, the user can access detailed information about each device connected to the
network. That includes the devices brand name, possible release date of that product, and
operating system that device might be using. I believe my results were based on the amount of
people that were at my house over the week. The numbers were not consistent; however, the
collection of data was not far off from each other.
NMAP
Day
Monda
y
Tuesd
ay
Wednes
day
Thursd
ay
Frida
y
Saturd
ay
Time
1 #
of
Hosts
1
1
1
1
1
1
Time
2 #
of
Hosts
1
1
1
1
1
1
Time
3 #
of
Hosts
1
1
1
1
1
1
Nmap, short for Network Mapper, it is a
powerful open-source tool used for network
scanning and security auditing
. Nmap uses various techniques to sc
an n
etworks and identify
hosts, services, operating systems, and vulnerabilities. It can be used to perform simple ping
sweeps or complex scans that include port scanning, version detection, OS fingerprin
ting, a
nd
scriptable interaction with target systems. One of the key advantages of Nmap is its flexibility. It
can be run on a variety of platforms including Windows, Linux, macOS, and even mobile
devices. During my scans using NMAP, I was the only was using my network during the
morning and evening. It was different than using Fing because NMAP tracks the number of
devices scanning the network.
Overall, the two scanning tools are essential when working with computers and networks.
Fing has many benefits that are more user-friendly, while NMAP can be more in depth in coding.
The difference between the two can be based on the users’ preferences. I enjoyed using the user-
friendly network scanner, Fing. The NMAP network scanner was interesting in a more skillful
way, which I enjoyed as well. The steps on both scanning tools are fairly easy to complete.
Network is required to complete these steps and tools such and internet access. In circumstances
that require one to check the devices connected to their network or scan to see if any other
devices are scanning the network, Fing and NMAP are great tools to use.
Overall, the two scanning tools are essential when working with computers and networks.
Fing has many benefits that are more user-friendly, while NMAP can be more in depth in coding.
The difference between the two can be based on the users’ preferences. I enjoyed using the user-
friendly network scanner, Fing. The NMAP network scanner was interesting in a more skillful
way, which I enjoyed as well. The steps on both scanning tools are fairly easy to complete.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help