Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Network Security
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Network Security begins with a brief look at how to design and implement effective security measures, which begins with a well-planned Security Policy. We open with an assessment of what equipment, data, and software the company has, what the company is trying to protect, what is at risk and what the threats are against those items at risk. This discussion includes who should be involved in the development of company policy and a brief look into possible policy items covering passwords, access, the Internet, firewalls, computer viruses, and encryption. We continue with an overview of backups, destruction of media, response to intrusions/policy violations/incidents, and a recovery plan. Next we provide a brief overview of some threats and a few possible solutions to those threats. Which includes viruses, Trojans, some email issues, denial of service, passwords, sniffers, spoofing, and the role of Telnet in attacks. We are given a brief look at Internet/World Wide Web languages and their security problems. This is followed by a similar discussion about operating systems/network software. The importance of logging and auditing is briefly covered, as are firewalls and the services they provide. Moving on we will look at using encryption for email, communications, and data storage. We will wrap things up with a brief look at some security software packages and training options.