CFS 454 Writing Assignment Module 7

docx

School

West Virginia University,Parkersburg *

*We aren’t endorsed by this school

Course

454

Subject

Mechanical Engineering

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by ChancellorPheasant1453

Report
Audrey N. Sprout CFS 454: Network Defense Dr. Gardner Jr February 23 rd , 2024 Writing Assignment - What is Nmap? o Nmap is short for Network Mapper, and it is an extremely powerful tool used for security and network discovery. It is very flexible and can be used for a variety of purposes. It is typically used by security professionals, administrators, and hackers. - What is the purpose of Nmap? o The main purpose of Nmap is security auditing and network exploration. It allows you to discover devices as well as services on a computer network. This tool also allows you to identify potential vulnerabilities within your network. - How do you defend against Nmap? o Defending against Nmap involves implementing security measures to protect your network. There are several ways to defend against it such as configuring the firewalls, disabling unnecessary service on your network device. These defensive measures help protect your network against potential security threats. - What is SuperScan and how does it differ from Nmap? o SuperScan is typically used for port scanning and network services. It runs on a Microsoft Windows operating system. Like Nmap, it allows people to discover devices, identify open porta, and gather more information about their services. They differ in their platform support, interface, features, licensing and flexibility. - What is an Intrusion Detection System? o An Intrusion Detection System is a security tool that monitors network and system activities for suspicious or malicious behavior. It then alerts security or administrators when potential threats are detected.
- What is an Intrusion Prevention System? o An Intrusion Prevention System is a security tool that not only detects malicious activities but also actively blocks and prevents them in real-time. It is an essential component of having a network security strategy to help defend against a wide array of cyber threats. - How does an Intrusion Detection System differ from an Intrusion Prevention System? o The Intrusion Prevention System goes beyond the capabilities of an Intrusion Detection System. The Intrusion Detection System primarily focuses on alerting admin to potential security threats. Intrusion Prevention Systems take proactive measures to automatically respond to those threats. - What is a Honeypot? o It is a security tool deployed within a network to deceive attackers and gain information on their tactics and intentions. A honeypot is essentially a decoy system to lure attackers into interacting with it, diverting their attention away from essential assets. It also allows security personnel with insights into these potential threats. - Who is the project leader for the NMAP project? o The project leader for the NMAP project is Gordon Fyodor Lyon. He is the creator and main developer of Nmap, leading to its development. - Name another network scanner o Another popular network scanner is Zmap. It is an open-source network scanner that is designed for high-speed Internet-wide scanning. It is most well-known for its ability to scan an entire IPv4 address space in a few hours.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help