vulnerable areas
Download
Report
Transcript vulnerable areas
NETWORK INTRUSION
SECURITY BREACHES, THAT MAKE
NETWORKS VULNERABLE TO
UNAUTHORIZED ATTACKS
INTRODUCTION
• The world of computers has changed dramatically
in the past thirty years.
• Though INTERNET is good for the spread of
information, it has also led to the proliferation of
malicious information.
• This paper, discusses the various threats applicable
to Internet hosts, running server software or
working on a multi-user OS like UNIX.
SECURITY BREACHES
• Access control management : Guessing, Tools
like Cracker Jack, Protocol analyses programs,
Trojan Horses.
• Communication Protocols : IP address Spoofing,
Internet Routing attacks.
• Internet Applications : Risks involved in Telnet,
DNS services, SMTP services.
• Information services : Risks in WWW
servers(URL spoofing, CGI attacks)
CONCLUSION
• SECURITY TECHNOLOGIES: Firewalls,
Intrusion Detection system(IDS).
• Information security isn’t necessarily easy - But it
is an involuntary element in doing business.
• Threats change, vulnerabilities change, business
requirements change, and available counter
measures change. Hence the security policy must
be periodically and routinely re-evaluated.
BIBLIOGRAPHY
•
•
•
•
Internet Security by Othmar Kyas
www.hackers.com
http://secinf.net
http://searchnetworking.techtarget.com
PRESENTED BY
NAGINI INDUGULA (4/4 CSE)
98311A0515
Sree Nidhi Institute of Science and Technology
Hyderabad
?? QUESTIONS ??