70 likes | 168 Views
NETWORK INTRUSION. SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS. INTRODUCTION. The world of computers has changed dramatically in the past thirty years.
E N D
NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS
INTRODUCTION • The world of computers has changed dramatically in the past thirty years. • Though INTERNET is good for the spread of information, it has also led to the proliferation of malicious information. • This paper, discusses the various threats applicable to Internet hosts, running server software or working on a multi-user OS like UNIX.
SECURITY BREACHES • Access control management : Guessing, Tools like Cracker Jack, Protocol analyses programs, Trojan Horses. • Communication Protocols : IP address Spoofing, Internet Routing attacks. • Internet Applications : Risks involved in Telnet, DNS services, SMTP services. • Information services : Risks in WWW servers(URL spoofing, CGI attacks)
CONCLUSION • SECURITY TECHNOLOGIES: Firewalls, Intrusion Detection system(IDS). • Information security isn’t necessarily easy - But it is an involuntary element in doing business. • Threats change, vulnerabilities change, business requirements change, and available counter measures change. Hence the security policy must be periodically and routinely re-evaluated.
BIBLIOGRAPHY • Internet Security by Othmar Kyas • www.hackers.com • http://secinf.net • http://searchnetworking.techtarget.com
PRESENTED BY • NAGINI INDUGULA (4/4 CSE) 98311A0515 Sree Nidhi Institute of Science and Technology Hyderabad