SlideShare a Scribd company logo
1 of 33
Net Defender  By: Krishna Maddikara  Tuesday, May 2, 2001 SC 546
Synopsis of Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues Today: ,[object Object],[object Object],[object Object]
What are the Issues & Problems? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Who are the intruders? ,[object Object],[object Object],[object Object],[object Object]
Motives: ,[object Object],[object Object],[object Object],[object Object]
Possible Attacks: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example of  DoS attack: Intruder Target ICMP request with spoofed IP of target
Example of  DoS attack: Intruder Target Flood Target with replies
[object Object],[object Object]
Net Defenders
What is Net Defender? ,[object Object],[object Object]
Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by  novice and advanced users.
Objective of Net defender  Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers).  We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
REQUIREMENT ANALYSIS ,[object Object],[object Object],[object Object]
General System and Interface Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Main Screen Firewall has a simple user interface that gives you instant access to all your security features
Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you  want to control .
Port Scanner: ,[object Object]
Well-known ports used by  TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server     67 BOOTP Bootstrap Protocol    79 Finger Finger     80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
How do Firewalls work? ,[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering based on Port ,[object Object],[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering Based on Address ,[object Object],[object Object]
How Net Defender prevent ,[object Object]
Preventing Compromises and Vulnerabilities ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port Scanner: ,[object Object],[object Object],[object Object],[object Object]
Working of the filter: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Prevention: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Direction of Internet Vulnerabilities ,[object Object],[object Object],[object Object],[object Object]
Direction of Internet Security ,[object Object],[object Object],[object Object],[object Object]
Future Improvements: ,[object Object],[object Object]
We would like to thank: ,[object Object],[object Object],[object Object],[object Object],Thank you

More Related Content

What's hot

Chapter 12
Chapter 12Chapter 12
Chapter 12
cclay3
 
Network Security
Network SecurityNetwork Security
Network Security
phanleson
 

What's hot (20)

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introduction
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 

Viewers also liked

Kulturkartläggnings processen
Kulturkartläggnings  processenKulturkartläggnings  processen
Kulturkartläggnings processen
Lina Ydrefelt
 
Nostaljik Reklamlar
Nostaljik ReklamlarNostaljik Reklamlar
Nostaljik Reklamlar
halid şen
 
Zima sisljavic
Zima sisljavicZima sisljavic
Zima sisljavic
Gavranica
 
Sharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningSharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize Learning
Hendrik Drachsler
 
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
Повышение эффективности медийных рекламных кампаний  — Юлия МикедаПовышение эффективности медийных рекламных кампаний  — Юлия Микеда
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
Maria Podolyak
 
Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1
shimay
 

Viewers also liked (20)

Unit 2.6
Unit 2.6Unit 2.6
Unit 2.6
 
London magento
London magentoLondon magento
London magento
 
M02 un07 p02
M02 un07 p02M02 un07 p02
M02 un07 p02
 
We b development trends
We b  development  trendsWe b  development  trends
We b development trends
 
Kulturkartläggnings processen
Kulturkartläggnings  processenKulturkartläggnings  processen
Kulturkartläggnings processen
 
From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...
 
Nostaljik Reklamlar
Nostaljik ReklamlarNostaljik Reklamlar
Nostaljik Reklamlar
 
Zima sisljavic
Zima sisljavicZima sisljavic
Zima sisljavic
 
Sharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningSharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize Learning
 
Real time web
Real time webReal time web
Real time web
 
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
Повышение эффективности медийных рекламных кампаний  — Юлия МикедаПовышение эффективности медийных рекламных кампаний  — Юлия Микеда
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
 
Unit 2.1 Part 4
Unit 2.1 Part 4Unit 2.1 Part 4
Unit 2.1 Part 4
 
Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1
 
M02 un10 p01
M02 un10 p01M02 un10 p01
M02 un10 p01
 
Online Masterclass Learning Analytics
Online Masterclass Learning Analytics Online Masterclass Learning Analytics
Online Masterclass Learning Analytics
 
Eurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong KongEurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong Kong
 
Chapter2
Chapter2Chapter2
Chapter2
 
Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?
 
We love Aso!
We love Aso!We love Aso!
We love Aso!
 
2.4 Text in HTML
2.4 Text in HTML2.4 Text in HTML
2.4 Text in HTML
 

Similar to Net Defender

The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
Rachel Phillips
 

Similar to Net Defender (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Network security
Network securityNetwork security
Network security
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Day4
Day4Day4
Day4
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Net Defender

  • 1. Net Defender By: Krishna Maddikara Tuesday, May 2, 2001 SC 546
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Example of DoS attack: Intruder Target ICMP request with spoofed IP of target
  • 9. Example of DoS attack: Intruder Target Flood Target with replies
  • 10.
  • 12.
  • 13. Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by novice and advanced users.
  • 14. Objective of Net defender Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers). We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
  • 15.
  • 16.
  • 17. Main Screen Firewall has a simple user interface that gives you instant access to all your security features
  • 18. Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you want to control .
  • 19.
  • 20. Well-known ports used by TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server    67 BOOTP Bootstrap Protocol    79 Finger Finger    80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.

Editor's Notes

  1. Frequently, presenters must deliver material of a technical nature to an audience unfamiliar with the topic or vocabulary. The material may be complex or heavy with detail. To present technical material effectively, use the following guidelines from Dale Carnegie Training®.   Consider the amount of time available and prepare to organize your material. Narrow your topic. Divide your presentation into clear segments. Follow a logical progression. Maintain your focus throughout. Close the presentation with a summary, repetition of the key steps, or a logical conclusion.   Keep your audience in mind at all times. For example, be sure data is clear and information is relevant. Keep the level of detail and vocabulary appropriate for the audience. Use visuals to support key points or steps. Keep alert to the needs of your listeners, and you will have a more receptive audience.