70 likes | 173 Vues
Explore the evolving landscape of cyber threats affecting network security, including access control, communication protocols, and internet applications. Learn about security technologies like firewalls and intrusion detection systems for protection. Understand the importance of regularly updating security policies to adapt to changing threats and business requirements.
E N D
NETWORK INTRUSION SECURITY BREACHES, THAT MAKE NETWORKS VULNERABLE TO UNAUTHORIZED ATTACKS
INTRODUCTION • The world of computers has changed dramatically in the past thirty years. • Though INTERNET is good for the spread of information, it has also led to the proliferation of malicious information. • This paper, discusses the various threats applicable to Internet hosts, running server software or working on a multi-user OS like UNIX.
SECURITY BREACHES • Access control management : Guessing, Tools like Cracker Jack, Protocol analyses programs, Trojan Horses. • Communication Protocols : IP address Spoofing, Internet Routing attacks. • Internet Applications : Risks involved in Telnet, DNS services, SMTP services. • Information services : Risks in WWW servers(URL spoofing, CGI attacks)
CONCLUSION • SECURITY TECHNOLOGIES: Firewalls, Intrusion Detection system(IDS). • Information security isn’t necessarily easy - But it is an involuntary element in doing business. • Threats change, vulnerabilities change, business requirements change, and available counter measures change. Hence the security policy must be periodically and routinely re-evaluated.
BIBLIOGRAPHY • Internet Security by Othmar Kyas • www.hackers.com • http://secinf.net • http://searchnetworking.techtarget.com
PRESENTED BY • NAGINI INDUGULA (4/4 CSE) 98311A0515 Sree Nidhi Institute of Science and Technology Hyderabad