SlideShare a Scribd company logo
1 of 33
Net Defender  By: Krishna Maddikara  Tuesday, May 2, 2001 SC 546
Synopsis of Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues Today: ,[object Object],[object Object],[object Object]
What are the Issues & Problems? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Who are the intruders? ,[object Object],[object Object],[object Object],[object Object]
Motives: ,[object Object],[object Object],[object Object],[object Object]
Possible Attacks: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example of  DoS attack: Intruder Target ICMP request with spoofed IP of target
Example of  DoS attack: Intruder Target Flood Target with replies
[object Object],[object Object]
Net Defenders
What is Net Defender? ,[object Object],[object Object]
Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by  novice and advanced users.
Objective of Net defender  Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers).  We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
REQUIREMENT ANALYSIS ,[object Object],[object Object],[object Object]
General System and Interface Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Main Screen Firewall has a simple user interface that gives you instant access to all your security features
Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you  want to control .
Port Scanner: ,[object Object]
Well-known ports used by  TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server     67 BOOTP Bootstrap Protocol    79 Finger Finger     80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
How do Firewalls work? ,[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering based on Port ,[object Object],[object Object],[object Object],  Courtesy  http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering Based on Address ,[object Object],[object Object]
How Net Defender prevent ,[object Object]
Preventing Compromises and Vulnerabilities ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Port Scanner: ,[object Object],[object Object],[object Object],[object Object]
Working of the filter: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Prevention: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Direction of Internet Vulnerabilities ,[object Object],[object Object],[object Object],[object Object]
Direction of Internet Security ,[object Object],[object Object],[object Object],[object Object]
Future Improvements: ,[object Object],[object Object]
We would like to thank: ,[object Object],[object Object],[object Object],[object Object],Thank you

More Related Content

What's hot

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introductionRaghava Sharma
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
Chapter 12
Chapter 12Chapter 12
Chapter 12cclay3
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
Network Security
Network SecurityNetwork Security
Network Securityphanleson
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...skpatel91
 

What's hot (20)

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introduction
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
 

Viewers also liked

We b development trends
We b  development  trendsWe b  development  trends
We b development trendsRajib Ahmed
 
Kulturkartläggnings processen
Kulturkartläggnings  processenKulturkartläggnings  processen
Kulturkartläggnings processenLina Ydrefelt
 
From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...Joss Winn
 
Nostaljik Reklamlar
Nostaljik ReklamlarNostaljik Reklamlar
Nostaljik Reklamlarhalid şen
 
Zima sisljavic
Zima sisljavicZima sisljavic
Zima sisljavicGavranica
 
Sharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningSharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningHendrik Drachsler
 
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
Повышение эффективности медийных рекламных кампаний  — Юлия МикедаПовышение эффективности медийных рекламных кампаний  — Юлия Микеда
Повышение эффективности медийных рекламных кампаний — Юлия МикедаMaria Podolyak
 
Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1shimay
 
Online Masterclass Learning Analytics
Online Masterclass Learning Analytics Online Masterclass Learning Analytics
Online Masterclass Learning Analytics Hendrik Drachsler
 
Eurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong KongEurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong Kongvalrit
 
Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?Hendrik Drachsler
 

Viewers also liked (20)

Unit 2.6
Unit 2.6Unit 2.6
Unit 2.6
 
London magento
London magentoLondon magento
London magento
 
M02 un07 p02
M02 un07 p02M02 un07 p02
M02 un07 p02
 
We b development trends
We b  development  trendsWe b  development  trends
We b development trends
 
Kulturkartläggnings processen
Kulturkartläggnings  processenKulturkartläggnings  processen
Kulturkartläggnings processen
 
From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...From research student to academic: thinking about and preparing for academic ...
From research student to academic: thinking about and preparing for academic ...
 
Nostaljik Reklamlar
Nostaljik ReklamlarNostaljik Reklamlar
Nostaljik Reklamlar
 
Zima sisljavic
Zima sisljavicZima sisljavic
Zima sisljavic
 
Sharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize LearningSharing Data Sets to Personalize Learning
Sharing Data Sets to Personalize Learning
 
Real time web
Real time webReal time web
Real time web
 
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
Повышение эффективности медийных рекламных кампаний  — Юлия МикедаПовышение эффективности медийных рекламных кампаний  — Юлия Микеда
Повышение эффективности медийных рекламных кампаний — Юлия Микеда
 
Unit 2.1 Part 4
Unit 2.1 Part 4Unit 2.1 Part 4
Unit 2.1 Part 4
 
Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1Android Abc2009 Fall Shima091130 1
Android Abc2009 Fall Shima091130 1
 
M02 un10 p01
M02 un10 p01M02 un10 p01
M02 un10 p01
 
Online Masterclass Learning Analytics
Online Masterclass Learning Analytics Online Masterclass Learning Analytics
Online Masterclass Learning Analytics
 
Eurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong KongEurocham PSI seminar Hong Kong
Eurocham PSI seminar Hong Kong
 
Chapter2
Chapter2Chapter2
Chapter2
 
Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?Hoe ontwerp je een effectief leernetwerk?
Hoe ontwerp je een effectief leernetwerk?
 
We love Aso!
We love Aso!We love Aso!
We love Aso!
 
2.4 Text in HTML
2.4 Text in HTML2.4 Text in HTML
2.4 Text in HTML
 

Similar to Net Defender (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Network security
Network securityNetwork security
Network security
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Day4
Day4Day4
Day4
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
The Security Of Information Security
The Security Of Information SecurityThe Security Of Information Security
The Security Of Information Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Net Defender

  • 1. Net Defender By: Krishna Maddikara Tuesday, May 2, 2001 SC 546
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Example of DoS attack: Intruder Target ICMP request with spoofed IP of target
  • 9. Example of DoS attack: Intruder Target Flood Target with replies
  • 10.
  • 12.
  • 13. Net defender Problem Statement Developing a simple Firewall for securing Personal Computer from unauthorized access through Internet or network by novice and advanced users.
  • 14. Objective of Net defender Net Defender software is being designed keeping in mind a novice user (those who knows very less about networking or computers). We had laid a great deal of stress in providing a sound user interface so that a general user should learn how to use and control this firewall in simple and easy steps.
  • 15.
  • 16.
  • 17. Main Screen Firewall has a simple user interface that gives you instant access to all your security features
  • 18. Add Rule : This dialog box will help in adding new rules to Firewall. To create a rule, you must first specify the kind of traffic that should be affected by the rule. There are several different characteristics of traffic, each of which you can use to specifythe kind of traffic that you want to control .
  • 19.
  • 20. Well-known ports used by TCP Port Protocol Description     7 Echo Echoes a received datagram back to the sender      9 Discard Discards any datagram that is received    11 Users Active users    13 Daytime Returns the date and the time    17 Quote Returns a quote of the day    19 Chargen Returns a string of characters    20 FTP, Data File Transfer Protocol (data connection)    21 FTP, Control File Transfer Protocol (control connection)    23 TELNET Terminal Network    25 SMTP Simple Mail Transfer Protocol    53 DNS Domain Name Server    67 BOOTP Bootstrap Protocol    79 Finger Finger    80 HTTP Hypertext Transfer Protocol 111 RPC Remote Procedure Call
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.

Editor's Notes

  1. Frequently, presenters must deliver material of a technical nature to an audience unfamiliar with the topic or vocabulary. The material may be complex or heavy with detail. To present technical material effectively, use the following guidelines from Dale Carnegie Training®.   Consider the amount of time available and prepare to organize your material. Narrow your topic. Divide your presentation into clear segments. Follow a logical progression. Maintain your focus throughout. Close the presentation with a summary, repetition of the key steps, or a logical conclusion.   Keep your audience in mind at all times. For example, be sure data is clear and information is relevant. Keep the level of detail and vocabulary appropriate for the audience. Use visuals to support key points or steps. Keep alert to the needs of your listeners, and you will have a more receptive audience.