TY - BOOK AU - Cintu C Sabu (93613009) TI - Detection & prevention of vulnerabilities in enterprise ip networks KW - COMPUTER NETWORK KW - COMPUTER SECURITY KW - INTERNET PROTOCOL N2 - In today's high technology environment, organizations are becoming more and more dependent on their IP networks. The public is increasingly concerned about the proper use of information, particularly personal data. But these networks have a large number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. That is why computer attacks are very familiar in today’s world. In computer networks, an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Worms, virus, vulnerabilities of the system etc are the cause of attacks. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. In this project I am discussing some ways of detecting and preventing some of these vulnerabilities and they are: 1) SQL injection. 2) Vulnerabilities in authentication. 3) Vulnerabilities in session management ER -