On
The Current Scenario of Network Security
Submitted to
AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY
Guided By:
Dr. Bijalaxmi Panda
Department
ASET
Submitted By:
Archisman Misra
A2305209069
B.Tech – XCSE2
Amity University, Uttar Pradesh
Acknowledgement
I would like to acknowledge and express my heartfelt gratitude to the following persons who have made the completion of this paper possible:
My Faculty Guide, Ms. Bijalaxmi Panda for helping me decide my topic and brief me about it.
My Parents and Brother for putting up with my inhuman working hours. And specially Mom for giving me the much needed cups of tea at pivotal points in making this paper.
Heaps of thanks to MS15 and Heretic Saint for being the eternal guides throughout this project.
And a vote of thanks to the people I idolize, without you I wouldn’t be doing this project at all. Hence many thanks to Phiber Optik, Guzman, Stallman, Linus Torvalds, Steve Wozniak, Gary McKinnon, Comrade, Adrian Lamo and Dark Dante.
Certificate
This is to certify that Mr Archisman Misra, student of Bachelor of Technology in Computer Science Engineering has carried out the work presented in the Term paper entitled "The Current Scenario of Network Security" as a part of First year Programme of Bachelor of Technology in Computer Science Engineering from Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh under my supervision.
Dr. Bijalaxmi Panda
Department of Applied Sciences
ASET, Noida
INDEX
* Abstract * Introduction * Definition * Objective Of The Paper * The Legal Side * IT Act Of India 2010 * Advantages Of Cyber Laws * In Pursuit Of A Correct Security Methodology * Selecting The Correct Security Approach * What to do after a Security Audit? * Web Hacking : A Hacker’s Perspective
References: * Wikipedia, http://www.wikipedia.org * Nathalie Dagorn and Nicolas Bernard * Indian IT Act 2010 Documents * Abstract This paper on the Current Scenario of Network Security explores the global condition of the security of the networks and its biggest collection, the Internet. It begins by defining what Network Security actually is and what is its use in this world and our day-to-day lives. The paper also takes a peek at the legal side of network security and what all are its implications on the perpetrators of security threats. The paper takes a close look at the amendments made in the IT ACT of India, 2010. And what are the advantages of having cyber laws and how it affects us. Next we try to look at how to correctly approach a security technique, how to plan for it, how to develop it and how to implement it most importantly. It also tells the reader what to do after a network security audit. Last but not the least it takes a look at web hacking from a hacker’s perspective, highlighting the steps a hacker takes and how can compromisation of networks to security threats be prevented.