network intrusion n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
NETWORK INTRUSION PowerPoint Presentation
Download Presentation
NETWORK INTRUSION

Loading in 2 Seconds...

play fullscreen
1 / 7

NETWORK INTRUSION - PowerPoint PPT Presentation


  • 60 Views
  • Uploaded on

NETWORK INTRUSION. SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS. INTRODUCTION. The world of computers has changed dramatically in the past thirty years.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'NETWORK INTRUSION' - gwen


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
network intrusion

NETWORK INTRUSION

SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS

introduction
INTRODUCTION
  • The world of computers has changed dramatically in the past thirty years.
  • Though INTERNET is good for the spread of information, it has also led to the proliferation of malicious information.
  • This paper, discusses the various threats applicable to Internet hosts, running server software or working on a multi-user OS like UNIX.
security breaches
SECURITY BREACHES
  • Access control management : Guessing, Tools like Cracker Jack, Protocol analyses programs, Trojan Horses.
  • Communication Protocols : IP address Spoofing, Internet Routing attacks.
  • Internet Applications : Risks involved in Telnet, DNS services, SMTP services.
  • Information services : Risks in WWW servers(URL spoofing, CGI attacks)
conclusion
CONCLUSION
  • SECURITY TECHNOLOGIES: Firewalls, Intrusion Detection system(IDS).
  • Information security isn’t necessarily easy - But it is an involuntary element in doing business.
  • Threats change, vulnerabilities change, business requirements change, and available counter measures change. Hence the security policy must be periodically and routinely re-evaluated.
bibliography
BIBLIOGRAPHY
  • Internet Security by Othmar Kyas
  • www.hackers.com
  • http://secinf.net
  • http://searchnetworking.techtarget.com
presented by
PRESENTED BY
  • NAGINI INDUGULA (4/4 CSE) 98311A0515

Sree Nidhi Institute of Science and Technology Hyderabad