BRAC University Institutional Repository

Detecting known host security flaws over a network connection

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Ahsan, Syeda Tasnuva
dc.contributor.author Alam, Samina Rabiul
dc.date.accessioned 2011-02-02T06:39:50Z
dc.date.available 2011-02-02T06:39:50Z
dc.date.issued 2009-08-11
dc.identifier.other ID 06110001
dc.identifier.other ID 06110028
dc.identifier.uri http://hdl.handle.net/10361/759
dc.description This thesis is submitted in a partial fulfillment of the requirements for the degree of bachelor of science in Electronics and Communication Engineering. en_US
dc.description.abstract To test if a host contains any known security flaws over a network connection a Vulnerability Assessment (VA) could be used. This thesis describes different techniques used by VA tools over a network connection to detect known security flaws. To decrease the risk of flaws not being detected, several VA tools could be used. In this paper firstly types of vulnerabilities are discussed and also the impacts of different vulnerabilities are pointed out. This paper mainly focuses on two different categories of VA tool, Port Scanner and Vulnerability Scanner. As an example of port scanner this paper discusses about Nmap port scanner and as vulnerability scanner it discusses about Nessus. Both these tools are open source VA tools. This paper contains the scan reports using these tools over a range of IP addresses. The analysis part of this paper gives an idea about how these tools scan for security flaws and suggest solutions to make a host or network out of risk. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering, BRAC University en_US
dc.title Detecting known host security flaws over a network connection en_US
dc.type Thesis en_US


Files in this item

Files Size Format View
Thesis paper on ... ecurity Flaws Over a N.pdf 1.066Mb PDF View/Open or Preview

This item appears in the following Collection(s)

Show simple item record

Policy Guidelines

Search DSpace


Browse

My Account