ABSTRACT
Some history of networking is included, as well as an introduction to TCP/IP and internetworking. We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality. It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace. Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them.
TABLE OF CONTENTS
CERTIFICATION PAGE
ACKNOWLEDGEMENT
DEDICATION
ABSTRACT
CHAPTER ONE
1.0 INTRODUCTION
1.2STATEMENT OF PROBLEM
1.3PURPOSE OF STUDY
1.4 IMPORTANCE OF STUDY
1.5DEFINITION OF TERMS
1.6ASSUMPTION OF STUDY
CHAPTER TWO
2.0LITERATURE REVIEW
CHAPTER THREE
3.1 NETWORK THREATS AND COUNTERMEASURES
Information Gathering
Sniffing
Spoofing
Session Hijacking
Denial of Service
3.2 HOST THREATS AND COUNTERMEASURES
Viruses, Trojan Horses, and Worms
FOOTPRINTING
PASSWORD CRACKING
3.4 DENIAL OF SERVICE
ARBITRARY CODE EXECUTION
UNAUTHORIZED ACCESS
APPLICATION THREATS AND COUNTERMEASURES
CHAPTER FOUR
4.1AUTHENTICATION
4.2 COOKIE REPLAY ATTACKS
4.3 Authorization
CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Ip Spoofing: A Network Threat.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/276/ip-spoofing-a-network-threat
"Ip Spoofing: A Network Threat." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/276/ip-spoofing-a-network-threat>.
"Ip Spoofing: A Network Threat.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/276/ip-spoofing-a-network-threat>.
"Ip Spoofing: A Network Threat.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/276/ip-spoofing-a-network-threat.
- Related Works
- Multimedia Conferencing
- Stack Ip: New Packet Marketing And Filtering Mechanics For Ddos And Ip Spoofing Defense
- Design And Implementation Of An On-line Entrance Examination System. (a Case Study Of Enugu State Poset –primary Education Board )
- Design And Implementation Of State Civil Service Payrol Accounting System (a Case Study Civil Service Commission Enugu)
- Design And Implementation Of Computerized Tourism Information System A Case Study Of Enugu State Tourism Board
- Design And Implementation Of Osbe To Handle Cyclic Policy Interdependency (case Study Of Dhl Enugu)
- Design And Implementation Of A Computerized Point Of Sales System (a Case Study Of Golden Toast Enugu)
- Design And Implementation Of Tcp/ip Chat Client Server Option And Challenges
- Design And Implementation Of Text Editor For Linux Plat Form (case Study Of Linux)
- Design And Implementation Of A Computerised Crime Record System (a Case Study Of State C.i.d. Headquarters Enugu)