0% found this document useful (0 votes)
135 views

A Report Presented On: Network Security

This document is a report on network security presented at V.V.P. Engineering College by Purvi B. Vasava. It discusses key network security concepts like confidentiality, integrity, and availability as well as authentication, authorization, and non-repudiation relating to users. The report also examines vulnerabilities exploited by intruders such as internet and technical vulnerabilities. Different attacks like DOS, SSL attacks, and preventive measures including firewalls, secure network devices, and dealing with security incidents are outlined. International misuse of computers through techniques like Trojan horses, denial of service, and email spoofing are also summarized.

Uploaded by

Sunil Pillai
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views

A Report Presented On: Network Security

This document is a report on network security presented at V.V.P. Engineering College by Purvi B. Vasava. It discusses key network security concepts like confidentiality, integrity, and availability as well as authentication, authorization, and non-repudiation relating to users. The report also examines vulnerabilities exploited by intruders such as internet and technical vulnerabilities. Different attacks like DOS, SSL attacks, and preventive measures including firewalls, secure network devices, and dealing with security incidents are outlined. International misuse of computers through techniques like Trojan horses, denial of service, and email spoofing are also summarized.

Uploaded by

Sunil Pillai
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10

A REPORT

PRESENTED ON
NETWORK SECURITY

PRESENTED AT: V.V.P.ENGG.COLLAGE.


PREPARED BY: PURVI B. VASAVA.
SEMESTER: 6TH IT.
INTRODUCTION
 Three basic security concepts important to
information on the internet are
CONFIDENTIALITY,INTEGRITY,and
AVAILABILITY.
 Concepts relating to the people who use that
information are
AUTHENTICATION,AUTHORIZATION,
and NONREPUDIATION.
WHAT DOES AN INTRUDER
MAKE USE OF.
 1. INTERNET VULNERABILITIES.
 2. TECHNICAL VULNERABILITIES.
(I) Flaws in s/w or protocol designs.
(II) Weakness in how protocols and s/w
are implemented.
(III) Weakness in system and network
configurations.
DIFFERENT ATTACKS AND
PREVENTIVE MEASURES.
 IP ADDRESS TORN APART.
 DOS ATTACKS.
- PING OF DEATH.
- MODEM DISCONNECTION.
- SYN FLOODING.
 SSL TORN APART.
 COOKIES AND PRIVACY.
 DDoS ATTACKS.
 TRIBAL FLOOD NETWORK.
DEALING WITH AN
INCIDENT.
 NETWORK INFORMATION SERVICE
AS CRACKING TOOL.
 REMOTE LOGIN/SHELL AS
CRACKING TOOL.
 FTP AS CRACKING TOOL.
FIREWALLS.
 A firewall is simply a group of components that
collectively form barrier between two networks.
 No of terms specific to firewalls and networking
are
 BASTION HOST.
 ROUTER.
 ACCESS CONTROL LIST.
 DEMILITARIZED ZONE.
 PROXY.
SECURE NETWORK
DEVICES.
 SECURE MODEMS;DIAL-BACK
SYSTEMS.
 CRYPTO-CAPABLE ROUTERS.
 VIRTUAL PRIVATE NETWORKS.
INTERNATIONAL MISUSE OF
YOUR COMPUTER.
1. TROJAN HORSE PROGRAMS.
2. DENIAL OF SERVICE.
3. UNPROTECTED WINDOWS SHARES.
4. MOBILE CODE(Java/JavaScript/ActiveX).
INTERNATIONAL MISUSE OF
YOUR COMPUTER.
5. CROSS-SITE SCRIPTING.
6. EMAIL SPOOFING.
7. EMAIL BORN VIRUSES.
8. HIDDEN FILE EXTENSIONS.
9. PACKET SNIFFING.

You might also like