1 / 12

Network Security Audit

Network Security Audit. By David Liu University of Plymouth. Introduction. Increasing number of Internet connection Low knowledge users Existing security softwares give wrong feeling of security. Project’s objectives. To develop an audit program which can be manipulated by novices users

Download Presentation

Network Security Audit

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security Audit By David Liu University of Plymouth

  2. Introduction • Increasing number of Internet connection • Low knowledge users • Existing security softwares give wrong feeling of security

  3. Project’s objectives • To develop an audit program which can be manipulated by novices users • It should contain material security tests • It should make users understand the dangers of Internet.

  4. Existing programs • Nessus • GFI Lan guard • Microsoft Baseline Security Analyser • ATK: Attack tool kit

  5. Nessus

  6. GLI Languard

  7. MBSA

  8. Innovations • No installation required • Online • Human behaviour • Easy to use • Simple and clear explanations

  9. Audit tools • Port Scanner • Human behaviour: MCQ • Password tester • Antivirus analyser • Key logger

  10. Survey and feedback • 24 users answered the survey • 7 novice users, 17 intermediary and experts • Most of the found this project contains relevant audit tools • They found it easier to use • Only 3 novice users had technical problems • A few people exploited explanation pages

  11. Conclusion and perspectives • Bypass JAVA requirements • Multithreads port scan • Add more material audit tools • Make explanation pages more attractive

  12. Thank you

More Related