This document is a report on network security presented at V.V.P. Engineering College by Purvi B. Vasava. It discusses key network security concepts like confidentiality, integrity, and availability as well as authentication, authorization, and non-repudiation relating to users. The report also examines vulnerabilities exploited by intruders such as internet and technical vulnerabilities. Different attacks like DOS, SSL attacks, and preventive measures including firewalls, secure network devices, and dealing with security incidents are outlined. International misuse of computers through techniques like Trojan horses, denial of service, and email spoofing are also summarized.
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
135 views
A Report Presented On: Network Security
This document is a report on network security presented at V.V.P. Engineering College by Purvi B. Vasava. It discusses key network security concepts like confidentiality, integrity, and availability as well as authentication, authorization, and non-repudiation relating to users. The report also examines vulnerabilities exploited by intruders such as internet and technical vulnerabilities. Different attacks like DOS, SSL attacks, and preventive measures including firewalls, secure network devices, and dealing with security incidents are outlined. International misuse of computers through techniques like Trojan horses, denial of service, and email spoofing are also summarized.
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10
A REPORT
PRESENTED ON NETWORK SECURITY
PRESENTED AT: V.V.P.ENGG.COLLAGE.
PREPARED BY: PURVI B. VASAVA. SEMESTER: 6TH IT. INTRODUCTION Three basic security concepts important to information on the internet are CONFIDENTIALITY,INTEGRITY,and AVAILABILITY. Concepts relating to the people who use that information are AUTHENTICATION,AUTHORIZATION, and NONREPUDIATION. WHAT DOES AN INTRUDER MAKE USE OF. 1. INTERNET VULNERABILITIES. 2. TECHNICAL VULNERABILITIES. (I) Flaws in s/w or protocol designs. (II) Weakness in how protocols and s/w are implemented. (III) Weakness in system and network configurations. DIFFERENT ATTACKS AND PREVENTIVE MEASURES. IP ADDRESS TORN APART. DOS ATTACKS. - PING OF DEATH. - MODEM DISCONNECTION. - SYN FLOODING. SSL TORN APART. COOKIES AND PRIVACY. DDoS ATTACKS. TRIBAL FLOOD NETWORK. DEALING WITH AN INCIDENT. NETWORK INFORMATION SERVICE AS CRACKING TOOL. REMOTE LOGIN/SHELL AS CRACKING TOOL. FTP AS CRACKING TOOL. FIREWALLS. A firewall is simply a group of components that collectively form barrier between two networks. No of terms specific to firewalls and networking are BASTION HOST. ROUTER. ACCESS CONTROL LIST. DEMILITARIZED ZONE. PROXY. SECURE NETWORK DEVICES. SECURE MODEMS;DIAL-BACK SYSTEMS. CRYPTO-CAPABLE ROUTERS. VIRTUAL PRIVATE NETWORKS. INTERNATIONAL MISUSE OF YOUR COMPUTER. 1. TROJAN HORSE PROGRAMS. 2. DENIAL OF SERVICE. 3. UNPROTECTED WINDOWS SHARES. 4. MOBILE CODE(Java/JavaScript/ActiveX). INTERNATIONAL MISUSE OF YOUR COMPUTER. 5. CROSS-SITE SCRIPTING. 6. EMAIL SPOOFING. 7. EMAIL BORN VIRUSES. 8. HIDDEN FILE EXTENSIONS. 9. PACKET SNIFFING.