Detection & prevention of vulnerabilities in enterprise ip networks

By: Material type: TextTextSubject(s): Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT "Aumento Performers Solutions Pvt. Ltd." Summary: In today's high technology environment, organizations are becoming more and more dependent on their IP networks. The public is increasingly concerned about the proper use of information, particularly personal data. But these networks have a large number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. That is why computer attacks are very familiar in today’s world. In computer networks, an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Worms, virus, vulnerabilities of the system etc are the cause of attacks. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. In this project I am discussing some ways of detecting and preventing some of these vulnerabilities and they are: 1) SQL injection. 2) Vulnerabilities in authentication. 3) Vulnerabilities in session management.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Project Reports Project Reports Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Not for loan R-925
Project Reports Project Reports Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Not for loan R-708

Master of Science in Computer Science and Information security 2013-2015 EXT Elizabeth Sherly Shibin R "Aumento Performers Solutions Pvt. Ltd."

In today's high technology environment, organizations are becoming more and more dependent on their IP networks. The public is increasingly concerned about the proper use of information, particularly personal data. But these networks have a large number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. That is why computer attacks are very familiar in today’s world.

In computer networks, an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Worms, virus, vulnerabilities of the system etc are the cause of attacks. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. In this project I am discussing some ways of detecting and preventing some of these vulnerabilities and they are:

1) SQL injection.

2) Vulnerabilities in authentication.

3) Vulnerabilities in session management.

There are no comments on this title.

to post a comment.