Foot Printing also known as reconnaissance is the technique used for gathering information about computer systems and the entities that they belong to. To get this information, a hacker might use various tools and technologies. There are various methods in which a hacker can obtain your information/data. One in particular that comes to mind is Port Scanning. Other methods of gaining access to a network infrastructure would be Social Engineering, Keylogging, Denial of Service, otherwise known as DOS/DDOS, Waterhole Attacks, etc. This is just a short list of the different attacks that hackers use on a daily basis in order to obtain your information. Understanding the different methods and how to control the overall effect of these attacks can be crucial to the survival of one’s business.
Owning a productive business is not easy in the day an age we live in, which is why it is all the more important that we properly secure our assets and information. Many productive businesses are resorting to the World Wide Web via social media to advertise their businesses. There’s nothing wrong with advertising over social media, in fact it can be very productive, however if not done right it can be very detrimental to an organization. A business today in order to …show more content…
Port Scanners are very useful in identifying open doors in which information can go in and out. They can be useful as well as harmful to networks, which is why it is seemly important that we know what ports are opened and closed. It’s important to understand that there is no way to stop someone from port scanning your computer, while you are on the Internet because when you access an Internet server it opens a port, which opens a door to your computer. However, there is software out there that can aid in the fight against port