000 01623nam a22001817a 4500
003 OSt
005 20220107122809.0
008 160317b xxu||||| |||| 00| 0 eng d
040 _c
100 _aCintu C Sabu (93613009)
_98562
245 _aDetection & prevention of vulnerabilities in enterprise ip networks
502 _bMaster of Science in Computer Science and Information security
_c2013-2015
_dEXT
_eElizabeth Sherly
_fShibin R
_g"Aumento Performers Solutions Pvt. Ltd."
520 _aIn today's high technology environment, organizations are becoming more and more dependent on their IP networks. The public is increasingly concerned about the proper use of information, particularly personal data. But these networks have a large number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. That is why computer attacks are very familiar in today’s world. In computer networks, an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Worms, virus, vulnerabilities of the system etc are the cause of attacks. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. In this project I am discussing some ways of detecting and preventing some of these vulnerabilities and they are: 1) SQL injection. 2) Vulnerabilities in authentication. 3) Vulnerabilities in session management.
650 _aCOMPUTER NETWORK
_98563
650 _aCOMPUTER SECURITY
_98564
650 _aINTERNET PROTOCOL
_98565
942 _2ddc
_cPR
999 _c5004
_d5004