SlideShare a Scribd company logo
PRESENTATION OF MAJOR PROJECT
                      ON
INFORMATION SECURITY AND NETWORK MANAGEMENT



                                      PRESENTED BY:
                          GAURAV SHUKLA -IT 4TH YEAR
                  TARUN KUMAR SRIVASTAVA-IT 4TH YEAR
INTRODUCTION
 “Information Security & Network Management”
  project deals with the creation of a Linux based
  network and security.
 The project provides security features as well as
  handles network management of a company named
  “WEBRIDGE SYSTEMS”.
 The project mainly consists of servers namely –
      file server, mail server, web server and domain
      name servers.
WEBRIDGE SYSTEM
 Webridge Systems is one of the pioneers in
  providing I.T infrastructure and solutions on various
  platforms.
 We handle the relationship and take on the spot
  decisions.
 Webridge Systems uses technology as a means to
  empower customers by providing them with user
  friendly solutions that enhance productivity.
Webridge System has following
departments:-
 IT Department:-
                 This department is working to put
 technology to its highest and best effective use.

 SALES Department:-
                        This department has a crucial
 role in the sales of products.
 PURCHASE Department:-
                            This department is
 responsible for co-ordinating the acquisition of
 goods and services.

 FINANCE Department:-
                           This department deals with
 the financial matters and act as a bridge between
 Webridge and clients.
INTRODUCTION TO LINUX
 Linux is a generic term referring to Unix-like
  computer operating systems based on the Linux
  kernel.
 Linux can be installed on a wide variety of computer
  hardware, ranging from embedded devices such as
  mobile phones, smartphones and wristwatches to
  mainframes and supercomputers.
 Linux is the most secure operating
  system, therefore, most of the severs are using
  Linux operating system.
Basic Linux Commands Used
 pwd: Displays the path for current working
    directory.
    ls: Lists files and subdirectories in a directory.
    ls –l: Gives a long listing for files and subdirectories
    in a directory.
     ls –la : Displays also hidden files in addition.
   exit: Ends current session.
    touch: Creates a new empty file.
 mkdir: Create a new directory.
 cd: Change directory.
 rmdir: Removes empty directory.
 cat: Concatenate files or read files.
 cp: Copy files from one directory to other.
 mv: Moves file from one directory to other.
 rm: Removes files and directory.
NETWORK MANAGEMENT
 Subnetting:-
            Splitting a single network into
 smaller, separate subnets reduces number of hosts
 per network is called subnetting.
 Telnet:-
            It is a network protocol used on the
 Internet or LAN to provide a bidirectional
 interactive text-oriented communications
 facility(port number 23).
 Web-Hosting:-
                 We have done web hosting by
 installing a predefined package called WEBMIN.

              Webmin is a web-based interface for
 system administration.

                Using any modern web browser, you
 can setup user accounts, Apache, DNS, file sharing
 and much more.
DOMAIN NAME SERVER(DNS)
 The Domain Name System maintains the domain
 namespace and provides translation services
 between two namespaces.
WEB MAIL
 The mailing feature acts as a bridge between
 different departments which connects employees of
 different departments.
SECURITY FEATURES
 Firewall:-
           A Firewall is a device installed between the
 internal network and the global internet.

            It is designed to forward some packets and
 filter (not forward) others.

           It act as a security of information flowing
 across the network.
 Filter:-
          When a program performs operations on
  input and writes the result to the standard output, it
  is called a filter.

          Through filter we can restrict unauthorized
  users from entering into unalloted work space.
 Permissions:-
             Every file or folder in Linux has access
 permissions. There are three types of permissions
 (what allowed to do with a file):
            read access - 5
            write access - 7
            execute access - 1
CONCLUSION
 Our project is an information as well as network
 management system to connect and automate all the
 department of the company.

 The system contains various servers
 (DNS, Apache, Mail) that helps all the department of
 the company to upload all information.

 The mail server developed as the part of the project
 will give the company a dedicated e-mail service for
 all management member and employees.
FUTURE SCOPE
 Security measures can be enhanced by using more
 secure protocol and hardware firewalls.

 As the number of users increase, more account space
 will be required. At that time, moderation in user
 quota portioning will become a necessity.

 Better connection solution is required so that users
 can access the network from remote locations.

More Related Content

What's hot

Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
Kadiresan Nagarattiname
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
saritasingh19866
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
hadiyaahmed2
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environment
kem warren
 
linux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabadlinux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabad
Devops Trainer
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
nurulaisyah5324
 
Linux; Operating System
Linux; Operating SystemLinux; Operating System
Linux; Operating System
JayEl Cadawas
 
what is LINUX ? presentation.
what is LINUX ? presentation.what is LINUX ? presentation.
what is LINUX ? presentation.
saad_khan1122
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
Wayne Jones Jnr
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
Ramasubbu .P
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
Avnish Khandelwal
 
Chapter 01 networking
Chapter 01 networkingChapter 01 networking
Chapter 01 networking
Ainuddin Yousufzai
 
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
Vibrant Technologies & Computers
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
Sagar Gor
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
Veeral Bhateja
 
1e operating sysytem4 bicar
1e operating sysytem4 bicar1e operating sysytem4 bicar
1e operating sysytem4 bicar
guestd8b1148b
 
Ppt af linux
Ppt af linuxPpt af linux
Basic LAN types
Basic LAN typesBasic LAN types
Basic LAN types
LawrenceIgenewari
 
OS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environmentsOS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environments
Vaibhav Khanna
 
Window server 2008
Window server 2008Window server 2008
Window server 2008
IGZ Software house
 

What's hot (20)

Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environment
 
linux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabadlinux os-basics,Devops training in Hyderabad
linux os-basics,Devops training in Hyderabad
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
 
Linux; Operating System
Linux; Operating SystemLinux; Operating System
Linux; Operating System
 
what is LINUX ? presentation.
what is LINUX ? presentation.what is LINUX ? presentation.
what is LINUX ? presentation.
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Chapter 01 networking
Chapter 01 networkingChapter 01 networking
Chapter 01 networking
 
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
1e operating sysytem4 bicar
1e operating sysytem4 bicar1e operating sysytem4 bicar
1e operating sysytem4 bicar
 
Ppt af linux
Ppt af linuxPpt af linux
Ppt af linux
 
Basic LAN types
Basic LAN typesBasic LAN types
Basic LAN types
 
OS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environmentsOS concepts 6 OS for various computing environments
OS concepts 6 OS for various computing environments
 
Window server 2008
Window server 2008Window server 2008
Window server 2008
 

Viewers also liked

дарнопих
дарнопихдарнопих
дарнопих
Olena Ursu
 
Introduction to Joomla
Introduction to JoomlaIntroduction to Joomla
Introduction to Joomla
Asif Islam
 
Ukr part iii ppt (5 july 2016 uspc)
Ukr part iii ppt (5 july 2016 uspc)Ukr part iii ppt (5 july 2016 uspc)
Ukr part iii ppt (5 july 2016 uspc)
Olena Ursu
 
7 habits of Highly Effective People
7 habits of Highly Effective People7 habits of Highly Effective People
7 habits of Highly Effective People
Mariami Lolashvili
 
New technology
New technologyNew technology
New technology
Christian Li
 
Smart city 27.07.2012 engl
Smart city  27.07.2012 englSmart city  27.07.2012 engl
Smart city 27.07.2012 engl
Olena Ursu
 
Size estimation of most at risk populations
Size estimation of most at risk populationsSize estimation of most at risk populations
Size estimation of most at risk populations
Dr Ajith Karawita
 
веснина а.в. статья киров
веснина а.в. статья кироввеснина а.в. статья киров
веснина а.в. статья кировDemanessa
 
Sales consultant marketing
Sales consultant marketingSales consultant marketing
Sales consultant marketing
Tiffany Johnson
 
0902861264 Cho thuê mua bán carina plaza MS Trang
0902861264 Cho thuê mua bán carina plaza MS Trang0902861264 Cho thuê mua bán carina plaza MS Trang
0902861264 Cho thuê mua bán carina plaza MS TrangBin Nấm
 
Annual-Report-RTB-2014
Annual-Report-RTB-2014Annual-Report-RTB-2014
Annual-Report-RTB-2014
Luis Augusto Becerra Lopez-Lavalle
 
New Bhaya Boat Factsheet
New Bhaya Boat FactsheetNew Bhaya Boat Factsheet
New Bhaya Boat Factsheet
Bhaya Cruises
 
нормы времени
нормы временинормы времени
нормы времениDemanessa
 
9. bartoshyk
9. bartoshyk9. bartoshyk
9. bartoshyk
Olena Ursu
 
Ecological problems in estonia
Ecological problems in estoniaEcological problems in estonia
Ecological problems in estonia
Carl Custav
 
Literatura catalana de postguerra
Literatura catalana de postguerraLiteratura catalana de postguerra
Literatura catalana de postguerraIgnacio Martinez
 
A few cuisines on offer
A few cuisines on offerA few cuisines on offer
A few cuisines on offer
Rahil Bindra
 

Viewers also liked (20)

дарнопих
дарнопихдарнопих
дарнопих
 
Introduction to Joomla
Introduction to JoomlaIntroduction to Joomla
Introduction to Joomla
 
Ukr part iii ppt (5 july 2016 uspc)
Ukr part iii ppt (5 july 2016 uspc)Ukr part iii ppt (5 july 2016 uspc)
Ukr part iii ppt (5 july 2016 uspc)
 
Twitter
TwitterTwitter
Twitter
 
7 habits of Highly Effective People
7 habits of Highly Effective People7 habits of Highly Effective People
7 habits of Highly Effective People
 
New technology
New technologyNew technology
New technology
 
Dress
DressDress
Dress
 
Smart city 27.07.2012 engl
Smart city  27.07.2012 englSmart city  27.07.2012 engl
Smart city 27.07.2012 engl
 
Size estimation of most at risk populations
Size estimation of most at risk populationsSize estimation of most at risk populations
Size estimation of most at risk populations
 
веснина а.в. статья киров
веснина а.в. статья кироввеснина а.в. статья киров
веснина а.в. статья киров
 
Sales consultant marketing
Sales consultant marketingSales consultant marketing
Sales consultant marketing
 
0902861264 Cho thuê mua bán carina plaza MS Trang
0902861264 Cho thuê mua bán carina plaza MS Trang0902861264 Cho thuê mua bán carina plaza MS Trang
0902861264 Cho thuê mua bán carina plaza MS Trang
 
Annual-Report-RTB-2014
Annual-Report-RTB-2014Annual-Report-RTB-2014
Annual-Report-RTB-2014
 
New Bhaya Boat Factsheet
New Bhaya Boat FactsheetNew Bhaya Boat Factsheet
New Bhaya Boat Factsheet
 
нормы времени
нормы временинормы времени
нормы времени
 
9. bartoshyk
9. bartoshyk9. bartoshyk
9. bartoshyk
 
Saoirse M
Saoirse MSaoirse M
Saoirse M
 
Ecological problems in estonia
Ecological problems in estoniaEcological problems in estonia
Ecological problems in estonia
 
Literatura catalana de postguerra
Literatura catalana de postguerraLiteratura catalana de postguerra
Literatura catalana de postguerra
 
A few cuisines on offer
A few cuisines on offerA few cuisines on offer
A few cuisines on offer
 

Similar to Welcome

Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
ojaswiniwagh
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
rosu555
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network Design
Jenny Mancini
 
Chetanya Dabi CLOUD COMPUTING PPT.pptx
Chetanya Dabi CLOUD COMPUTING PPT.pptxChetanya Dabi CLOUD COMPUTING PPT.pptx
Chetanya Dabi CLOUD COMPUTING PPT.pptx
ChetanyaDabi
 
Hardware1
Hardware1Hardware1
Hardware1
George Ranson
 
Hardware1
Hardware1Hardware1
Hardware1
George Ranson
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Monika Kumari
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
Mugabo4
 
Basic of Networking
Basic of NetworkingBasic of Networking
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
CatherineBotardo3
 
Solution
SolutionSolution
Solution
amitkahire
 
Solution
SolutionSolution
Solution
amitkahire
 
WEEK 1_ IT Network Engineering Class.pptx
WEEK 1_ IT Network Engineering Class.pptxWEEK 1_ IT Network Engineering Class.pptx
WEEK 1_ IT Network Engineering Class.pptx
dclmict1
 
Using samba
Using sambaUsing samba
Using samba
Ali Abdo
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
guestf70326
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
guestf70326
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
guestf70326
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentation
nikhilpatil49
 

Similar to Welcome (20)

Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network Design
 
Chetanya Dabi CLOUD COMPUTING PPT.pptx
Chetanya Dabi CLOUD COMPUTING PPT.pptxChetanya Dabi CLOUD COMPUTING PPT.pptx
Chetanya Dabi CLOUD COMPUTING PPT.pptx
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
 
Basic of Networking
Basic of NetworkingBasic of Networking
Basic of Networking
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
 
Solution
SolutionSolution
Solution
 
Solution
SolutionSolution
Solution
 
WEEK 1_ IT Network Engineering Class.pptx
WEEK 1_ IT Network Engineering Class.pptxWEEK 1_ IT Network Engineering Class.pptx
WEEK 1_ IT Network Engineering Class.pptx
 
Using samba
Using sambaUsing samba
Using samba
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentation
 

Recently uploaded

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Welcome

  • 1.
  • 2. PRESENTATION OF MAJOR PROJECT ON INFORMATION SECURITY AND NETWORK MANAGEMENT PRESENTED BY: GAURAV SHUKLA -IT 4TH YEAR TARUN KUMAR SRIVASTAVA-IT 4TH YEAR
  • 3. INTRODUCTION  “Information Security & Network Management” project deals with the creation of a Linux based network and security.  The project provides security features as well as handles network management of a company named “WEBRIDGE SYSTEMS”.  The project mainly consists of servers namely – file server, mail server, web server and domain name servers.
  • 4. WEBRIDGE SYSTEM  Webridge Systems is one of the pioneers in providing I.T infrastructure and solutions on various platforms.  We handle the relationship and take on the spot decisions.  Webridge Systems uses technology as a means to empower customers by providing them with user friendly solutions that enhance productivity.
  • 5.
  • 6. Webridge System has following departments:-  IT Department:- This department is working to put technology to its highest and best effective use.  SALES Department:- This department has a crucial role in the sales of products.
  • 7.  PURCHASE Department:- This department is responsible for co-ordinating the acquisition of goods and services.  FINANCE Department:- This department deals with the financial matters and act as a bridge between Webridge and clients.
  • 8.
  • 9. INTRODUCTION TO LINUX  Linux is a generic term referring to Unix-like computer operating systems based on the Linux kernel.  Linux can be installed on a wide variety of computer hardware, ranging from embedded devices such as mobile phones, smartphones and wristwatches to mainframes and supercomputers.  Linux is the most secure operating system, therefore, most of the severs are using Linux operating system.
  • 10.
  • 11. Basic Linux Commands Used  pwd: Displays the path for current working directory.  ls: Lists files and subdirectories in a directory.  ls –l: Gives a long listing for files and subdirectories in a directory.  ls –la : Displays also hidden files in addition.  exit: Ends current session.  touch: Creates a new empty file.
  • 12.  mkdir: Create a new directory.  cd: Change directory.  rmdir: Removes empty directory.  cat: Concatenate files or read files.  cp: Copy files from one directory to other.  mv: Moves file from one directory to other.  rm: Removes files and directory.
  • 13. NETWORK MANAGEMENT  Subnetting:- Splitting a single network into smaller, separate subnets reduces number of hosts per network is called subnetting.
  • 14.  Telnet:- It is a network protocol used on the Internet or LAN to provide a bidirectional interactive text-oriented communications facility(port number 23).
  • 15.  Web-Hosting:- We have done web hosting by installing a predefined package called WEBMIN. Webmin is a web-based interface for system administration. Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and much more.
  • 16.
  • 17. DOMAIN NAME SERVER(DNS)  The Domain Name System maintains the domain namespace and provides translation services between two namespaces.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. WEB MAIL  The mailing feature acts as a bridge between different departments which connects employees of different departments.
  • 23. SECURITY FEATURES  Firewall:- A Firewall is a device installed between the internal network and the global internet. It is designed to forward some packets and filter (not forward) others. It act as a security of information flowing across the network.
  • 24.
  • 25.  Filter:- When a program performs operations on input and writes the result to the standard output, it is called a filter. Through filter we can restrict unauthorized users from entering into unalloted work space.
  • 26.  Permissions:- Every file or folder in Linux has access permissions. There are three types of permissions (what allowed to do with a file): read access - 5 write access - 7 execute access - 1
  • 27. CONCLUSION  Our project is an information as well as network management system to connect and automate all the department of the company.  The system contains various servers (DNS, Apache, Mail) that helps all the department of the company to upload all information.  The mail server developed as the part of the project will give the company a dedicated e-mail service for all management member and employees.
  • 28. FUTURE SCOPE  Security measures can be enhanced by using more secure protocol and hardware firewalls.  As the number of users increase, more account space will be required. At that time, moderation in user quota portioning will become a necessity.  Better connection solution is required so that users can access the network from remote locations.