SlideShare a Scribd company logo
1 of 33
Net Defender  By: Y.Hemanth Kumar M.Krishna Reddy CH.Mahesh Tuesday, May 2, 2001 SC 546
Synopsis of Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues Today: ,[object Object],[object Object],[object Object]
What are the Issues & Problems? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Who are the intruders? ,[object Object],[object Object],[object Object],[object Object]
Motives: ,[object Object],[object Object],[object Object],[object Object]
Possible Attacks: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example of  DoS attack: Intruder Target ICMP request with spoofed IP of target
Example of  DoS attack: Intruder Target Flood Target with replies
[object Object],[object Object]
Net Defenders
What is Net Defender? ,[object Object],[object Object]
Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by  novice and advanced users.
Objective of Net defender  Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers).  We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
REQUIREMENT ANALYSIS ,[object Object],[object Object],[object Object]
General System and Interface Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Main Screen Firewall has a simple user interface that gives you instant access to all your security features
Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you  want to control .
Port Scanner: ,[object Object]
Well-known ports used by  TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server     67 BOOTP Bootstrap Protocol    79 Finger Finger     80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
How do Firewalls work? ,[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering based on Port ,[object Object],[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering Based on Address ,[object Object],[object Object]
How Net Defender prevent ,[object Object]
Preventing Compromises and Vulnerabilities ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port Scanner: ,[object Object],[object Object],[object Object],[object Object]
Working of the filter: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Prevention: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Direction of Internet Vulnerabilities ,[object Object],[object Object],[object Object],[object Object]
Direction of Internet Security ,[object Object],[object Object],[object Object],[object Object]
Future Improvements: ,[object Object],[object Object]
We would like to thank: ,[object Object],[object Object],[object Object],[object Object],Thank you

More Related Content

What's hot

Chapter 12
Chapter 12Chapter 12
Chapter 12
cclay3
 
Network Security
Network SecurityNetwork Security
Network Security
phanleson
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
leminhvuong
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 

What's hot (20)

Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
 
Firewalls
FirewallsFirewalls
Firewalls
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
Port scanning
Port scanningPort scanning
Port scanning
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 

Viewers also liked (8)

SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
 
Carnaval Bien
Carnaval BienCarnaval Bien
Carnaval Bien
 
Workshop 2 revised
Workshop 2 revisedWorkshop 2 revised
Workshop 2 revised
 
Born digital collection work flow2
Born digital collection work flow2Born digital collection work flow2
Born digital collection work flow2
 
MUSE
MUSEMUSE
MUSE
 
Workshop 1 revised
Workshop 1 revisedWorkshop 1 revised
Workshop 1 revised
 
Cutting Edge Technology used in ePADD
Cutting Edge Technologyused in ePADDCutting Edge Technologyused in ePADD
Cutting Edge Technology used in ePADD
 
cross-media publishing in global media conglomerate
cross-media publishing in global media conglomeratecross-media publishing in global media conglomerate
cross-media publishing in global media conglomerate
 

Similar to Netdefender

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
Rachel Phillips
 

Similar to Netdefender (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Firewalls
FirewallsFirewalls
Firewalls
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Netdefender

  • 1. Net Defender By: Y.Hemanth Kumar M.Krishna Reddy CH.Mahesh Tuesday, May 2, 2001 SC 546
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Example of DoS attack: Intruder Target ICMP request with spoofed IP of target
  • 9. Example of DoS attack: Intruder Target Flood Target with replies
  • 10.
  • 12.
  • 13. Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by novice and advanced users.
  • 14. Objective of Net defender Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers). We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
  • 15.
  • 16.
  • 17. Main Screen Firewall has a simple user interface that gives you instant access to all your security features
  • 18. Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you want to control .
  • 19.
  • 20. Well-known ports used by TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server    67 BOOTP Bootstrap Protocol    79 Finger Finger    80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.

Editor's Notes

  1. Frequently, presenters must deliver material of a technical nature to an audience unfamiliar with the topic or vocabulary. The material may be complex or heavy with detail. To present technical material effectively, use the following guidelines from Dale Carnegie Training®.   Consider the amount of time available and prepare to organize your material. Narrow your topic. Divide your presentation into clear segments. Follow a logical progression. Maintain your focus throughout. Close the presentation with a summary, repetition of the key steps, or a logical conclusion.   Keep your audience in mind at all times. For example, be sure data is clear and information is relevant. Keep the level of detail and vocabulary appropriate for the audience. Use visuals to support key points or steps. Keep alert to the needs of your listeners, and you will have a more receptive audience.