network security by tce hack spot
TRANSCRIPT
what is Network Security
Firewalls TCP/IP DDOS
Vulnerabilities in Networks
NETWORK SECURITY
What is Network Security: In this concept we will deal with the needs and
objectives, history , types, working, security tools, network security technology,firewalls and its types,
SSL(security Socket Layer) cocept, protocol, cryptography. And also why the world is not cent percent
secure, whats the actuall thing behind the Network. From a small Industries to a google servers needs
Network Security methods, unless the works will be worthless. If
there is not any kind of security in networks, the vulnerabilities that may appear , which we can’t expect
from our mind. The vulnerabilities that are inserted by computer port. Hence the network security ensure
encryptions, authentication mechanisms, intrusion detections also in some time.
Firewall System: The firewalls are the strongest gate to the network
traffics. It blocks the unnecessary network traffics. In this topic we will deals with the firewall security
system, authentication encountering, firewalls for database management systems, how the firewall is not
broken and broken by hackers in some case, why it is widely used for servers, what’s the actual thing
done in firewall system. The network security Is mainly under controlled by using firewalls. The browsers,
antivirus, bank DBMS are having strong firewalls. The network based IDs(NIDS) monitor each packets
sends by a private user and the own user.
Internet F firewall
• Vulnerabilities: Attacks on Different Layers
– IP Attacks
– ICMP Attacks
– Routing Attacks
– TCP Attacks
– Application Layer Attacks
• Today, the vulnerabilities are the major affecting non-human beings, the vulnerabilities are made
through weekness in codings, improper html lines, absence of disable text editing, sql injections
methods. In the concept we will discuss about the major causes in TCP/IP transferring sessions.
Vulnerabilities leads to ARP poisoning , IP spoofing, ports weekness in software and websites,ICMP
ATTACKS, Router attacks,TCP LAYER ATTACKS,APPLICATION LAYER ATTACKS.
The main objective of dos attack is make a service unusable, usually by
overloading the server or network.
Normally the dos attacks are performed by a single system. There are so
many dos and ddos attacks performed in any applications and websites. It
is of three types, simple, co -ordinated attacks and distributed attack. In
this concept we will detailed in ddos attack against any target system,
how they are performed.
Target system
unknown mac/ip address
unknown mac/ip address
unknown mac/ip address
SNIFFING
It is a process of capturing the data packets released by victim pc. That the sniffing concepts take place in
session hijacking. The tools involved in this process are CAIN n ABEL, pack sniffer. This concept also involve
in MITM (Man In the Middle Attack). In this topic, the user change its mac and ip address as the target
receiver address, hence the packets sent by the server or any data is also dropped by the hacker here. This
we called as mac spoofing, ip spoofing.(i.e) it is manually done. ARP poisoning is a kind of mac spoofing. In
this concept we will describe the mode of sniffing and its preventions.
MAN IN THE MIDDLE ATTACK
The MAN IN THE MIDDLE ATTACK is kind of sniffing, in this method the attacker hide his
identity and spoofing his all IDS, capturing the all packets from the provider.
AND WE WILL DISCUSS ABOUT THE FOLLOWING:
SESSION HIJACKING
SQL INJECTIONS
CROSS SCRIPT ATTACKS
NETWORK BUGS
THANK YOU..
THIAGARAJAR COLLEGE OF ENGINEERING, MADURAI
NAME :UDHAYA PRAKASH.C & VIGNESHWARAN.B
YEAR: 1ST YEAR
DEP:CSE
MAIL IDS: [email protected] and [email protected]