Preview

The Current Scenario of Network Security

Good Essays
Open Document
Open Document
6814 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Current Scenario of Network Security
TERM PAPER

On

The Current Scenario of Network Security

Submitted to

AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY

Guided By:

Dr. Bijalaxmi Panda
Department
ASET
Submitted By:

Archisman Misra
A2305209069
B.Tech – XCSE2

Amity University, Uttar Pradesh

Acknowledgement

I would like to acknowledge and express my heartfelt gratitude to the following persons who have made the completion of this paper possible:

My Faculty Guide, Ms. Bijalaxmi Panda for helping me decide my topic and brief me about it.
My Parents and Brother for putting up with my inhuman working hours. And specially Mom for giving me the much needed cups of tea at pivotal points in making this paper.

Heaps of thanks to MS15 and Heretic Saint for being the eternal guides throughout this project.

And a vote of thanks to the people I idolize, without you I wouldn’t be doing this project at all. Hence many thanks to Phiber Optik, Guzman, Stallman, Linus Torvalds, Steve Wozniak, Gary McKinnon, Comrade, Adrian Lamo and Dark Dante.

Certificate

This is to certify that Mr Archisman Misra, student of Bachelor of Technology in Computer Science Engineering has carried out the work presented in the Term paper entitled "The Current Scenario of Network Security" as a part of First year Programme of Bachelor of Technology in Computer Science Engineering from Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh under my supervision.

Dr. Bijalaxmi Panda
Department of Applied Sciences
ASET, Noida
INDEX

* Abstract * Introduction * Definition * Objective Of The Paper * The Legal Side * IT Act Of India 2010 * Advantages Of Cyber Laws * In Pursuit Of A Correct Security Methodology * Selecting The Correct Security Approach * What to do after a Security Audit? * Web Hacking : A Hacker’s Perspective



References: * Wikipedia, http://www.wikipedia.org * Nathalie Dagorn and Nicolas Bernard * Indian IT Act 2010 Documents * Abstract This paper on the Current Scenario of Network Security explores the global condition of the security of the networks and its biggest collection, the Internet. It begins by defining what Network Security actually is and what is its use in this world and our day-to-day lives. The paper also takes a peek at the legal side of network security and what all are its implications on the perpetrators of security threats. The paper takes a close look at the amendments made in the IT ACT of India, 2010. And what are the advantages of having cyber laws and how it affects us. Next we try to look at how to correctly approach a security technique, how to plan for it, how to develop it and how to implement it most importantly. It also tells the reader what to do after a network security audit. Last but not the least it takes a look at web hacking from a hacker’s perspective, highlighting the steps a hacker takes and how can compromisation of networks to security threats be prevented.

You May Also Find These Documents Helpful

  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Best Essays

    6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Risk Assessment

    • 1733 Words
    • 7 Pages

    Networking security personnel play a major role in the security of anything and everything within the network. There are risks involved with keeping servers secured when people try to hack into the system. Cyber security personnel are responsible for keeping all the information secure that is on the network. Key roles that will play a big part in the completion of this project will pertain to network security and reliability and…

    • 1733 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Threats

    • 1222 Words
    • 4 Pages

    Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.…

    • 1222 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Security India

    • 5999 Words
    • 24 Pages

    The growing dependency on the information technology (IT) makes cybersecurity a vital component of the India’s national security infrastructure. Lately, data collection, processing, storage, transmission capabilities, mobile, wireless, and cloud computing are increasing in huge numbers and make cyber attacks easily to occur.…

    • 5999 Words
    • 24 Pages
    Powerful Essays