Port Scanner - Ethics

Ethics

The information gathered by a port scan has many legitimate uses including network inventory and the verification of the security of a network. Port scanning can, however, also be used to compromise security. Many exploits rely upon port scans to find open ports and send specific data patterns in an attempt to trigger a condition known as a buffer overflow. Such behavior can compromise the security of a network and the computers therein, resulting in the loss or exposure of sensitive information and the ability to do work.

The threat level caused by a port scan can vary greatly according to the method used to scan, the kind of port scanned, its number, the value of the targeted host and the administrator who monitors the host. But a port scan is often viewed as a first step for an attack, therefore considered seriously because it can disclose much sensitive information about the host Despite this, the probability of a port scan alone followed by a real attack is small. The probability of an attack is much higher when the port scan is associated with a vulnerability scan.

Read more about this topic:  Port Scanner

Famous quotes containing the word ethics:

    Ethics and religion differ herein; that the one is the system of human duties commencing from man; the other, from God. Religion includes the personality of God; Ethics does not.
    Ralph Waldo Emerson (1803–1882)

    If you take away ideology, you are left with a case by case ethics which in practise ends up as me first, me only, and in rampant greed.
    Richard Nelson (b. 1950)

    The most powerful lessons about ethics and morality do not come from school discussions or classes in character building. They come from family life where people treat one another with respect, consideration, and love.
    Neil Kurshan (20th century)