Ping Sweeps and Port Scans
Introduction
Every information infrastructure of any organization is target for hackers. Hackers will always come up with new ways of trying to gain access to the network whether internally or externally. Some of the techniques that have been employed by intruders include ping sweeps and port scans (Baskin, & Kanclirz, 2008). They use these means to access network information, which would be instrumental for them in the process of hacking.
Ping sweeps
Ping sweeps is a major way through which hackers will gain access to network resources. Every IT professional should be worried about the possibility of the same happening to his or ...