tailieunhanh - Guideline on Network Security Testing: Recommendations of the National Institute of Standards and Technology

Port scanners, such as nmap8 (see Appendix B for more information), first identify active hosts in the address range specified by the user using Transport Control Protocol/Internet Protocol (TCP/IP) Internet Control Message Protocol (ICMP) ECHO and ICMP ECHO_REPLY packets. Once active hosts have been identified, they are scanned for open TCP and User Datagram Protocol (UDP) ports 9 that will then identify the network services operating on that host. A number of scanners support different scanning methods that have different strengths and weaknesses that are usually explained in the scanner documentation (see Appendix D for more information). For. | Guideline on Network Security NIST Special Publication 800-42 Testing Recommendations of the National Institute of Standards and Technology John Wack Miles Tracy Murugiah Souppaya C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg MD 20899-8930 October 2003 PRHIf . Department of Commerce Donald L. Evans Secretary Technology Administration Phillip J. Bond Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement Jr. Director SP 800-42 Guideline on Network Security Testing Reports on Computer Systems Technology The Information Technology Laboratory ITL at the National Institute of Standards and Technology NIST promotes the . economy and public welfare by providing technical leadership for the Nation s measurement and standards infrastructure. ITL develops tests test methods reference data proof of concept implementations and technical analysis to advance the development and productive use of information technology. ITL s responsibilities include the development of technical physical administrative and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL s research guidance and outreach efforts in computer security and its collaborative activities with industry government and academic organizations. National Institute of Standards and Technology Special Publication 800-42 Natl. Inst. Stand. Technol. Spec. Publ. 800-42 XX pages October 2003 CODEN XXXXX Certain commercial entities equipment or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology nor is it intended to imply that the entities .

TỪ KHÓA LIÊN QUAN