Detection & prevention of vulnerabilities in enterprise ip networks (Record no. 5004)

MARC details
000 -LEADER
fixed length control field 01623nam a22001817a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220107122809.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160317b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Transcribing agency
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Cintu C Sabu (93613009)
9 (RLIN) 8562
245 ## - TITLE STATEMENT
Title Detection & prevention of vulnerabilities in enterprise ip networks
502 ## - DISSERTATION NOTE
Degree type Master of Science in Computer Science and Information security
Name of granting institution 2013-2015
Year degree granted EXT
-- Elizabeth Sherly
-- Shibin R
Miscellaneous information "Aumento Performers Solutions Pvt. Ltd."
520 ## - SUMMARY, ETC.
Summary, etc. In today's high technology environment, organizations are becoming more and more dependent on their IP networks. The public is increasingly concerned about the proper use of information, particularly personal data. But these networks have a large number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. That is why computer attacks are very familiar in today’s world. <br/><br/>In computer networks, an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Worms, virus, vulnerabilities of the system etc are the cause of attacks. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. In this project I am discussing some ways of detecting and preventing some of these vulnerabilities and they are:<br/><br/>1) SQL injection. <br/><br/>2) Vulnerabilities in authentication.<br/><br/>3) Vulnerabilities in session management.<br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER NETWORK
9 (RLIN) 8563
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER SECURITY
9 (RLIN) 8564
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INTERNET PROTOCOL
9 (RLIN) 8565
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     IIITM-K Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre 17/03/2016   R-708 17/03/2016 17/03/2016 Project Reports
    Dewey Decimal Classification     IIITM-K Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre 08/02/2017   R-925 08/02/2017 08/02/2017 Project Reports