100% found this document useful (1 vote)
90 views14 pages

Network Security Research Presentation

The document summarizes a research presentation on network security. It outlines the introduction, research methodology, literature review on logical vulnerabilities, internal and physical security, RADIUS servers, network security tools, and recommendations. The literature review analyzes logical vulnerabilities in networks and the absence of VLANs. It also examines the need to adequately protect against internal human threats. The document recommends the use of firewalls and identifies GFI LANguard as a powerful tool for detecting vulnerabilities.

Uploaded by

neha shanbhag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
90 views14 pages

Network Security Research Presentation

The document summarizes a research presentation on network security. It outlines the introduction, research methodology, literature review on logical vulnerabilities, internal and physical security, RADIUS servers, network security tools, and recommendations. The literature review analyzes logical vulnerabilities in networks and the absence of VLANs. It also examines the need to adequately protect against internal human threats. The document recommends the use of firewalls and identifies GFI LANguard as a powerful tool for detecting vulnerabilities.

Uploaded by

neha shanbhag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

NETWORK SECURITY

RESEARCH PRESENTATION
BY BHAGAVATHI VIDYA PS – M20MC25
OUTLINE INTRODUCTION & ABSTRACT
RESEARCH METHODOLOGY LITERATURE
REVIEW
• Logical VulnerabilitiesInternal and Physical SecurityRADIUS
ServerNetwork Security ToolsFunctionality and
FeaturesRecommendation &Conclusion
INTRODUCTION & ABSTRACT

• “Network security refers to all hardware and software functions, characteristics,


features, operational procedures, accountability measures, access controls, and
administrative and management policy required to provide an acceptable level of
protection for hardware, software, and information in a network.” (Steven L,
Shaffer, and Alan R Simon, 1994)Network security hasn’t been as important as it is
nowadays with all this technological developments.As network vulnerabilities are
constantly at a rise, network security vulnerabilities are evaluated in three
categories i.e. logical security, internal security and external security.
 RESEARCH METHODOLOGY

• We utilized Scilly University in our research as a basis of our


discussions.Moreover, we focused on qualitative research on
information security, tools, assessments and statistical data in
some cases.We also found some internet journals, newspapers
reports, articles, and our text book to be very helpful
LITERATURE REVIEW

• Logical Vulnerabilities: The current logical controls for protecting information


assets within the network are:Microsoft Active directory (it provides a secure
administration of user profiles and File sharing features)ISA server (it can be
considered as a firewall and a proxy server as well due to support of cache
management functions)Firewall (it operates on chain of rules that are
defined by the security specialist, consultant or a vendor)
LITERATURE REVIEW THE PROBLEMS
BEHIND LOGICAL VULNERABILITIES


For logical vulnerability there is an absence of Virtual local area
networks.VLAN’s provide adequate security, where it separates traffic
for each department an also prevent denial of service attacks and
unwanted traffic broadcast that may result in network congestion
 LITERATURE REVIEW

• Internal and Physical Security: it is associated with adequate


protection from internal threats i.e. humans.It has been evaluated
that organizations emphasize only on physical and logical security
and often skips adequate protection of internal human controls
from threats such as unauthorized access, theft, etc
LITERATURE REVIEW

• RADIUS Server: Data related to security will be distributed on the


network and may include several devices that may interact with
the security data. RADIUS server will cater all the security data
within the network and stores it on one location or workstation or
on a storage device. In this way, risks and vulnerabilities
associated with the security data will be diminished
LITERATURE REVIEWNETWORK SECURITY
TOOLS

• There are many challenges that organizations have to overcome


for securing the information on the network as well as in the
servers.Certified skilled professionals, certified vulnerability
assessment tools, incident response management teams and
other relevant staff plays a significant role for protecting and
detecting potential threats.The two major tools:*Dragonsoft
Vulnerability Management*GFI LANguard.
LITERATURE REVIEW FUNCTIONALITY AND
FEATURES

• DragonSoft Vulnerability Management tool is preferable for small


medium enterprises to corporate enterprises.The primary tasks is
scan the network for detecting vulnerabilities.Moreover, the tool
also generates reports and performs centralized risk assessment
along with risk improvement options
 LITERATURE REVIEW FUNCTIONALITY AND
FEATURES

• GFI LANguard is a network vulnerability scanning and patch


management tool.It provides a graphical indicator that shows levels
of each associated threats in order to demonstrate a weighted
assessment of the current vulnerability status of the computer.It also
provides the user to establish customized a specific vulnerability scan
via a simple wizard
RECOMMENDATIONS & CONCLUSION

• We have identified vulnerabilities in logical, physical and internal


security of the network.An operation of firewall each is
recommended for computer networks.And after comparing
features for both of the tools, GFI LANguard is relatively more
powerful in detecting vulnerabilities.
 REFERENCES

• GOOGLE
THANK YOU
BY BHAGAVATHI VIDYA _ M20MC25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy