logo

Demonstration of Network Security Tools

The assignment is to become familiar with WLAN tools and develop an understanding of wireless technologies used in various networks.

10 Pages2109 Words85 Views
   

Added on  2022-12-22

About This Document

This document provides a demonstration of network security tools, specifically Snort and Nessus. It explains what these tools are, their uses, and how they can help mitigate threats. The document also includes a comparison between Snort and Nessus, as well as information on determining network requirements and finding the best tool for your needs.

Demonstration of Network Security Tools

The assignment is to become familiar with WLAN tools and develop an understanding of wireless technologies used in various networks.

   Added on 2022-12-22

ShareRelated Documents
Running head: DEMONSTRATION OF NETWORK SECURITY TOOLS
DEMONSTRATION OF NETWORK SECURITY TOOLS
Name of the Student:
Name of the University:
Author Note:
Demonstration of Network Security Tools_1
DEMONSTRATION OF NETWORK SECURITY TOOLS
1
Table of Contents
Snort...........................................................................................................................................2
What is snort?.........................................................................................................................2
Uses of snort:..........................................................................................................................2
Threat mitigation....................................................................................................................2
Nessus........................................................................................................................................3
What is Nessus?.....................................................................................................................3
Uses:.......................................................................................................................................3
Threat mitigation....................................................................................................................4
Comparison................................................................................................................................5
Determining network requirement for JKL:..............................................................................6
Best tool for JKL:.......................................................................................................................6
References:.................................................................................................................................8
Demonstration of Network Security Tools_2
DEMONSTRATION OF NETWORK SECURITY TOOLS
2
Snort
Figure 1 SNORT installation in Kali Linux
What is snort?
Snort is a free open source network intrusion detection system (IDS) and intrusion
prevention system (IPS) created in 1998 by Martin Roesch, former founder and CTO of
Sourcefire. Snort is now developed by Cisco, which purchased Sourcefire in 2013, at which
Roesch is a chief security architect.
In 2009, Snort entered InfoWorld's Open Source Hall of Fame as one of the "greatest [pieces
of] open source software of all time"
Uses of snort:
Snort's open source network-based intrusion detection/prevention system (IDS/IPS) has the
ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP)
networks. Snort performs protocol analysis, content searching and matching.
The program can also be used to detect probes or attacks, including, but not limited
to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server
message block probes, and stealth port scans.
Snort can be configured in three main modes: sniffer, packet logger, and network intrusion
detection. In sniffer mode, the program will read network packets and display them on the
console. In packet logger mode, the program will log packets to the disk. In intrusion
detection mode, the program will monitor network traffic and analyze it against a rule set
Demonstration of Network Security Tools_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
THE SECURITY OF NETWORK
|11
|1870
|16

Justification for choosing Snort as IDS
|4
|708
|101

Cyber Security Detection of Common Attacks Using SNORT Project 2022
|56
|14273
|14

Overview of Network Security
|6
|1018
|98

Demonstration of Computer Security Tools
|13
|3048
|206

Session Hijacking is a type of cyber-attack
|5
|849
|92