Network Security Analysis

Security  is  the second step after  that a successful network has been deployed. There are many  types  of  attacks  that  could  potentially  harm  the  network  and  an  administrator should  carefully  document  and  plan  the  weak  areas,  where  the  network  could  be compromised. Attackers...

Full description

Bibliographic Details
Main Authors: Hassan, Aamir, Mohammad, Fida
Format: Others
Language:English
Published: Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE) 2010
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002
id ndltd-UPSALLA1-oai-DiVA.org-hh-4002
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-hh-40022013-01-08T13:23:55ZNetwork Security AnalysisengHassan, AamirMohammad, FidaHögskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)2010Network Security AnalysisSecurity  is  the second step after  that a successful network has been deployed. There are many  types  of  attacks  that  could  potentially  harm  the  network  and  an  administrator should  carefully  document  and  plan  the  weak  areas,  where  the  network  could  be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security.  This  thesis  addresses  all  the  possible  tools  and  techniques  that  attackers  use  to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable  tools  to get  the  results.  It  is  important  to note  that most  of  the attention  in  network  security  is  given  to  the  router,  but  far  less  attention  is  given  to securing a switch. This  thesis will also address some more ways of securing a switch, if there is no router in the network.  The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Network Security Analysis
spellingShingle Network Security Analysis
Hassan, Aamir
Mohammad, Fida
Network Security Analysis
description Security  is  the second step after  that a successful network has been deployed. There are many  types  of  attacks  that  could  potentially  harm  the  network  and  an  administrator should  carefully  document  and  plan  the  weak  areas,  where  the  network  could  be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security.  This  thesis  addresses  all  the  possible  tools  and  techniques  that  attackers  use  to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable  tools  to get  the  results.  It  is  important  to note  that most  of  the attention  in  network  security  is  given  to  the  router,  but  far  less  attention  is  given  to securing a switch. This  thesis will also address some more ways of securing a switch, if there is no router in the network.  === The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.
author Hassan, Aamir
Mohammad, Fida
author_facet Hassan, Aamir
Mohammad, Fida
author_sort Hassan, Aamir
title Network Security Analysis
title_short Network Security Analysis
title_full Network Security Analysis
title_fullStr Network Security Analysis
title_full_unstemmed Network Security Analysis
title_sort network security analysis
publisher Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)
publishDate 2010
url http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002
work_keys_str_mv AT hassanaamir networksecurityanalysis
AT mohammadfida networksecurityanalysis
_version_ 1716518502950502400