09-02-2013, 04:52 PM
Net Sec software
1Net Sec .doc (Size: 3.08 MB / Downloads: 28)
INTRODUCTION
PROBLEM STATEMENT
Today world is living in Information age, so there is a huge requirement of share and transfer the information. Just Share and transfer the data is not satisfy the requirement but the task must be complete with the high speed also. In today’s world number of organizations start developing themselves in different areas of aspects.
As organizations grow and develop, external and internal pressures result in changing needs. Systems and practices must be organized so that they continue to fit an organization as its needs changes. As a result, the strategic and implementation plans are the overall blueprints that define how an organization will deploy its capital resources, budgetary resources, and technological resources in pursuit of its goal.
In providing the Internet access or LAN, research would be carried out into the type of infrastructure that is required in providing an effective data access to the employee. There is a need to be investigated a network used in organization from a single point of access by an administrator and here we got idea of our project
SYSTEM OVERVIEW
“Net Sec” is a active network investigator tool which analyze the Networked systems. This Analysis Tool provides maximum flexibility for the people working in an organization to handle their systems connected in a network, especially for the administrator. The application shall compile a list of the computers on the network, including selected pieces of information i.e the administrator can see how many computers are connected in the network, how many software are installed on each computer. He can check the installed software. The administrator can gather information about the hardware connected to the machines. He can administer that the software installed are working properly or not.
How it works on network?
In its simple form a packet sniffer simply captures all of the packets of data that pass through a given network interface. Typically, the packet sniffer would only capture packets that were intended for the machine in question. However, it also capable of capturing all packets traversing the network. By placing a packet sniffer tool on a server it can capture and analyze all of the network traffic within a given network.
A packet sniffer can only capture packet information within a given subnet. So, its not possible for a malicious attacker to place a packet sniffer on their home ISP network and capture network traffic from inside your corporate network. In order to do so, the packet sniffer needs to be running on a computer that is inside the corporate network as well.
Detecting packet sniffers on your network is not an easy task. By its very nature the packet sniffer is passive. It simply captures the packets that are traveling to the network interface it is monitoring. That means there is generally no signature or erroneous traffic to look for that would identify a machine running a packet sniffer.
TESTING
Software Testing is an empirical investigation conducted to provide stakeholders with information about the quality of the product or service under test, with respect to the context in which it is intended to operate. This includes, but is not limited to, the process of executing a program or application with the intent of finding software bugs.
Testing can never completely establish the correctness of computer software. Instead, it furnishes a criticism or comparison that compares the state and behaviour of the product against oracles—principles or mechanisms by which someone might recognize a problem. These oracles may include (but are not limited to) specifications, comparable products, past versions of the same product, inferences about intended or expected purpose, user or customer expectations, relevant standards, applicable laws, or other criteria.