1 / 7

NETWORK INTRUSION

NETWORK INTRUSION. SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS. INTRODUCTION. The world of computers has changed dramatically in the past thirty years.

gwen
Download Presentation

NETWORK INTRUSION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS

  2. INTRODUCTION • The world of computers has changed dramatically in the past thirty years. • Though INTERNET is good for the spread of information, it has also led to the proliferation of malicious information. • This paper, discusses the various threats applicable to Internet hosts, running server software or working on a multi-user OS like UNIX.

  3. SECURITY BREACHES • Access control management : Guessing, Tools like Cracker Jack, Protocol analyses programs, Trojan Horses. • Communication Protocols : IP address Spoofing, Internet Routing attacks. • Internet Applications : Risks involved in Telnet, DNS services, SMTP services. • Information services : Risks in WWW servers(URL spoofing, CGI attacks)

  4. CONCLUSION • SECURITY TECHNOLOGIES: Firewalls, Intrusion Detection system(IDS). • Information security isn’t necessarily easy - But it is an involuntary element in doing business. • Threats change, vulnerabilities change, business requirements change, and available counter measures change. Hence the security policy must be periodically and routinely re-evaluated.

  5. BIBLIOGRAPHY • Internet Security by Othmar Kyas • www.hackers.com • http://secinf.net • http://searchnetworking.techtarget.com

  6. PRESENTED BY • NAGINI INDUGULA (4/4 CSE) 98311A0515 Sree Nidhi Institute of Science and Technology Hyderabad

  7. ?? QUESTIONS ??

More Related