5.07.2011

SEMINAR 3: Intrusion Detection System

SPEAKER: Mr. Dahliyusmanto

DATE: 24 Feb 2011

An intrusion detection system is used to monitor network traffic, check for suspicious activities and notifies the network administrator or the system. In some instances, the IDS might also react to malicious or anomalous traffic and will take action such as barring the user or perhaps the IP address source from accessing the system.
Intrusion detection functions include:
  • Monitoring and analyzing both user and system activities
  • Analyzing system configurations and vulnerabilities
  • Assessing system and file
  • integrity
  • Ability to recognize patterns typical of attacks
  • Analysis of abnormal activity patterns 
  • Tracking user policy violatio

BY: Abdirahman Hussein Jibril (MC101170)

SEMINAR 4: Trusted computing

SPEAKER: Mr. Usama Tharwat Elhagari 

DATE: 3rd March 2011

Trusted Computing is the IT industry's answer to the growing challenges and potential costs of network and data security breaches. At its highest level, it aims to create secure computing environments for a range of industries without compromising functional integrity, privacy or individual rights. In order to establish specific practices and standards for developing and applying relevant technologies, these below elements are required:

Self-Encrypting Drives (SEDs)

SEDs protect sensitive data on network endpoint devices, such as laptops, that operate outside the protection of the network firewall.

Trusted Platform Modules (TPMs)

About 300,000,000 PCs have shipped with an embedded security token called a Trusted Platform Module (TPM). Today, virtually every business-class laptop comes equipped with these cryptographic chips, which deliver capabilities beyond traditional tokens or smart cards. 
·    An object is trusted if and only if it operates as expected.
·    An object is trustworthy if and only if it is proven to operate as expected
BY: Abdirahman Hussein Jibril (MC101170)

SEMINAR 2: MANET

SPEAKER: Mr. Satria Mandala 

DATE: 17 Feb 2011

MANET is self-configuring and self-maintaining network composing of mobile nodes that communicate over wireless channel

Characteristics of MANET

Ø  Communication via wireless.

Ø  Dynamic network topology.

Ø  Nodes can perform the roles of both hosts and  routers.    

Ø  Energy constrained.

Ø  Limited security.

Ø  Autonomous, no infrastructure needed.

Ø  No centralized controller

Two kinds of attack: passive eavesdropping and active interference.

These attacks could target a number of devices or services in MANETS such as wireless channels, routing protocols, high applications, or even security mechanisms themselves


8.16.2010

SEMINAR 1: VPN

SPEAKER:  Mr. Khalid 
DATE:  10 Feb 2011
VPN is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.
The main purpose of a VPN is to give the company the same capabilities as private leased lines at much lower cost by using the shared public infrastructure.

Common Uses of VPNs 

  • Remote Access Over the Internet 

  • Connecting Networks Over the Internet   

  • Connecting Computers over an Intranet

   
(Abdirahman Hussein jibril-MC101170)

2.13.2010

contact me

jacfar145@hotmail.com

8.02.2009

This is my new blog.
Enjoy!








copyright©2010 www.jabrauum.blogspot.com