Network Security Audit By David Liu University of Plymouth.

Slides:



Advertisements
Similar presentations
E-Scheduling Tools a Microsoft ® Outlook ® compatible product Product Overview.
Advertisements

Mobile Security Guide Matt Scofield, Eric Samson, Cong Le.
Department of Revenue Lessons for Management by Department of Revenue Internal Audit.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Abirami Poonkundran 2/22/10.  Goal  Introduction  Testing Methods  Testing Scope  My Focus  Current Progress  Explanation of Tools  Things to.
Vulnerability Analysis Borrowed from the CLICS group.
Information Security Overview BA483 – May 15 th, 2006 Presented By Kris Rosenberg, CISSP, MCSE, CCNA CTO Oregon State University College of Business.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
2004, Jei Nessus A Vulnerability Assessment tool A Security Scanner Information Networking Security and Assurance Lab National Chung Cheng University
IPhone Security: Understanding the KeyChain Nicholis Bufmack and Ryan Thomas CS 691 Summer 2009.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Digital Literacy Case Study Presented by: Jayne Holt - Assistant Principal.
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
TOSIBOX LOCK security options 1 1.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Many thanks for taking the time to look at LAN Audit PRO. In the following few slides I will describe some of the features of this innovative product.
The Carbon Calculator Project: A site to help people calculate their carbon footprint and help change their behaviour. Challenge: Help people through.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Unit 3 Predicting and analysing data from online behaviour questionnaire Short Term Goal: To accurately assess pupils current online behaviour and raise.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
Auditing Information Systems (AIS)
Module 3.4.  Understand the value of structured learning  Discover what the role of the tutor is in developing knowledge structures  Learn techniques.
Android Mobile Security Krystal Salerno. Introductions.
Security Assessment Tools Paula Kiernan Senior Consultant Ward Solutions.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Networks Network topologies. Networks Network topology Is the way the devices are arranged in a network In a wired network, it shows how the computers.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
RootKit By Parrag Mehta OUTLINE What is a RootKit ? Installation Types How do RootKits work ? Detection Removal Prevention Conclusion References.
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Retina Network Security Scanner
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
IT 463 – Scanning Assignment Shane Knisley Erik Bennett.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Who’s On My WiFi Mohan Kumar Puttasiddaiah. Who’s On My WiFi Shows Piggy backer on home or business network. Scans the entire network for every 5 to 10.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
 Midas PC touch is one of the fastest growing companies that offer 24X7 technical assistance and online computer support services to computer users worldwide.
Professional Technicians Do Provide Support For Guardian Not Scanning In Windows8 or In Other Windows. Professional Technicians Do Provide Support For.
ogWifi brings Wireless to YOUR community Who and what is ogWifi? ● Non-profit volunteer-based Community WIFI Group ● Help businesses and organizations.
Online Canon Printer Support & Customer Services
Seminar On Ethical Hacking Submitted To: Submitted By:
Tor Good + Evil.
Web-FIXS: A Knowledge System For Bridge Fabrication Error Resolution
Computer Security Fundamentals
Communications & Computer Networks Resource Notes - Introduction
Zach Garcia Keith Reiter
Hacking Windows Damian Gordon.
Presentation transcript:

Network Security Audit By David Liu University of Plymouth

Introduction  Increasing number of Internet connection  Low knowledge users  Existing security softwares give wrong feeling of security

Project’s objectives  To develop an audit program which can be manipulated by novices users  It should contain material security tests  It should make users understand the dangers of Internet.

Existing programs  Nessus  GFI Lan guard  Microsoft Baseline Security Analyser  ATK: Attack tool kit

Nessus

GLI Languard

MBSA

Innovations  No installation required  Online  Human behaviour  Easy to use  Simple and clear explanations

Audit tools  Port Scanner  Human behaviour: MCQ  Password tester  Antivirus analyser  Key logger

Survey and feedback  24 users answered the survey  7 novice users, 17 intermediary and experts  Most of the found this project contains relevant audit tools  They found it easier to use  Only 3 novice users had technical problems  A few people exploited explanation pages

Conclusion and perspectives  Bypass JAVA requirements  Multithreads port scan  Add more material audit tools  Make explanation pages more attractive

Thank you