Detection & prevention of vulnerabilities in enterprise ip networks
Material type:
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | Not for loan | R-925 | |||
![]() |
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | Not for loan | R-708 |
Master of Science in Computer Science and Information security 2013-2015 EXT Elizabeth Sherly Shibin R "Aumento Performers Solutions Pvt. Ltd."
In today's high technology environment, organizations are becoming more and more dependent on their IP networks. The public is increasingly concerned about the proper use of information, particularly personal data. But these networks have a large number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. That is why computer attacks are very familiar in today’s world.
In computer networks, an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Worms, virus, vulnerabilities of the system etc are the cause of attacks. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. In this project I am discussing some ways of detecting and preventing some of these vulnerabilities and they are:
1) SQL injection.
2) Vulnerabilities in authentication.
3) Vulnerabilities in session management.
There are no comments on this title.