- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 200字
- 2021-07-02 23:30:53
Scan a single IP
This command scans a single IP on the network. If a threat hunter notices strange activity coming from an unfamiliar host, a single IP scan may be useful. Being able to quickly distinguish false positives from false negatives is critical for efficient network security. For example, a network attack might go unnoticed because too many false positives are triggering alerts, creating alert noise.
The alert noise can potentially hide an attack from detection by creating a false negative. The noise also creates confusion and misdirection for the security analyst trying to determine if the attack is real or not. Using an intrusion detection system with an updated attack signature database will help distinguish false positives from false negatives more efficiently. Also, it is important to remember that having too many false negatives can also cause problems. If the intrusion detection system misses an attack, no alerts are activated. This gives the security analyst the illusion that the network is safe and secure, which may not be the case. This is a major issue because an attack could be going on and nobody would be aware of it until it was too late:
nmap 192.168.0.9

- 數據恢復方法及案例分析
- Practical Network Scanning
- 可信計算3.0工程初步
- 網絡安全技術與實訓(第4版)(微課版)
- Computer Forensics with FTK
- 網絡安全態勢感知
- 編譯與反編譯技術實戰
- 黑客攻防實戰從入門到精通
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 計算機網絡安全實驗指導
- Practical Internet of Things Security
- ATT&CK與威脅獵殺實戰
- 2010年中國互聯網網絡安全報告
- 企業安全建設入門:基于開源軟件打造企業網絡安全
- 深入探索區塊鏈