Download presentation
Presentation is loading. Please wait.
1
Network Security Research Presentation
MISY 3312 Intro. To Telecommunication Section 202 Done By: Razan AlSubaie Fatima AlSughaiyer Network Security Research Presentation
2
Outline Introduction & Abstract Research Methodology Literature review
Logical Vulnerabilities Internal and Physical Security RADIUS Server Network Security Tools Functionality and Features Recommendation &Conclusion
3
Introduction & Abstract
“Network security refers to all hardware and software functions, characteristics, features, operational procedures, accountability measures, access controls, and administrative and management policy required to provide an acceptable level of protection for hardware, software, and information in a network.” (Steven L, Shaffer, and Alan R Simon, 1994) Network security hasn’t been as important as it is nowadays with all this technological developments. As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security.
4
Research Methodology We utilized Scilly University in our research as a basis of our discussions. Moreover, we focused on qualitative research on information security, tools, assessments and statistical data in some cases. We also found some internet journals, newspapers reports, articles, and our text book to be very helpful.
5
Literature review Logical Vulnerabilities: The current logical controls for protecting information assets within the network are: Microsoft Active directory (it provides a secure administration of user profiles and File sharing features) ISA server (it can be considered as a firewall and a proxy server as well due to support of cache management functions) Firewall (it operates on chain of rules that are defined by the security specialist, consultant or a vendor)
6
Literature review The problems behind Logical Vulnerabilities:
For logical vulnerability there is an absence of Virtual local area networks. VLAN’s provide adequate security, where it separates traffic for each department an also prevent denial of service attacks and unwanted traffic broadcast that may result in network congestion
7
Literature review Internal and Physical Security: it is associated with adequate protection from internal threats i.e. humans. It has been evaluated that organizations emphasize only on physical and logical security and often skips adequate protection of internal human controls from threats such as unauthorized access, theft, etc.
8
Literature review RADIUS Server: Data related to security will be distributed on the network and may include several devices that may interact with the security data. RADIUS server will cater all the security data within the network and stores it on one location or workstation or on a storage device. In this way, risks and vulnerabilities associated with the security data will be diminished.
9
Literature review Network Security Tools: There are many challenges that organizations have to overcome for securing the information on the network as well as in the servers. Certified skilled professionals, certified vulnerability assessment tools, incident response management teams and other relevant staff plays a significant role for protecting and detecting potential threats. The two major tools: *Dragonsoft Vulnerability Management *GFI LANguard.
10
Literature review Functionality and Features:
DragonSoft Vulnerability Management tool is preferable for small medium enterprises to corporate enterprises. The primary tasks is scan the network for detecting vulnerabilities. Moreover, the tool also generates reports and performs centralized risk assessment along with risk improvement options.
11
Literature review Functionality and Features:
GFI LANguard is a network vulnerability scanning and patch management tool. It provides a graphical indicator that shows levels of each associated threats in order to demonstrate a weighted assessment of the current vulnerability status of the computer. It also provides the user to establish customized a specific vulnerability scan via a simple wizard.
12
Recommendations & Conclusion
We have identified vulnerabilities in logical, physical and internal security of the network. An operation of firewall each is recommended for computer networks. And after comparing features for both of the tools, GFI LANguard is relatively more powerful in detecting vulnerabilities.
13
Thank you for Listening
14
References Aydın, M. A., Zaim, A. H., & Ceylan, K. G. (2009). A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 35(3), doi: /j.compeleceng DragonSoft Vulnerability Management SC Magazine: For IT Security Professionals ( ), 22(2), pp GF LANguard SC Magazine: For IT Security Professionals ( ), 22(2), pp Intrusion Detection System Network Dictionary, , pp Internet security and acceleration server. (2007). Network Dictionary, , Remote Authentication Dial In User Service Security Network Dictionary, , pp SCHIRICK, E.A., Computer Network Security — Evolving Risks. Camping Magazine, 85(2), pp. 16. Smith, R. (2010). Advanced active directory security. Windows IT Pro, 16(10), Virtual LAN Network Dictionary, , pp
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.