Detection & prevention of vulnerabilities in enterprise ip networks (Record no. 5004)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01623nam a22001817a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220107122809.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160317b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE | |
Transcribing agency | |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Cintu C Sabu (93613009) |
9 (RLIN) | 8562 |
245 ## - TITLE STATEMENT | |
Title | Detection & prevention of vulnerabilities in enterprise ip networks |
502 ## - DISSERTATION NOTE | |
Degree type | Master of Science in Computer Science and Information security |
Name of granting institution | 2013-2015 |
Year degree granted | EXT |
-- | Elizabeth Sherly |
-- | Shibin R |
Miscellaneous information | "Aumento Performers Solutions Pvt. Ltd." |
520 ## - SUMMARY, ETC. | |
Summary, etc. | In today's high technology environment, organizations are becoming more and more dependent on their IP networks. The public is increasingly concerned about the proper use of information, particularly personal data. But these networks have a large number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. That is why computer attacks are very familiar in today’s world. <br/><br/>In computer networks, an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Worms, virus, vulnerabilities of the system etc are the cause of attacks. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. In this project I am discussing some ways of detecting and preventing some of these vulnerabilities and they are:<br/><br/>1) SQL injection. <br/><br/>2) Vulnerabilities in authentication.<br/><br/>3) Vulnerabilities in session management.<br/> |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER NETWORK |
9 (RLIN) | 8563 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY |
9 (RLIN) | 8564 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | INTERNET PROTOCOL |
9 (RLIN) | 8565 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | IIITM-K | Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | 17/03/2016 | R-708 | 17/03/2016 | 17/03/2016 | Project Reports | |||||
Dewey Decimal Classification | IIITM-K | Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | 08/02/2017 | R-925 | 08/02/2017 | 08/02/2017 | Project Reports |