You are on page 1of 2

Threats to digital information through Front

Door/Backdoor intrusion in Wired/Wireless Networks


And
Possible Remedies

OBJECTIVE:-
“Study of Breach in Privacy and Intellectual data in Wireless and Wired Networks
and solutions to safeguard them.”

METHODOLOGY:-
Today the most crucial information supporting any enterprise is manifesting itself
in mobile networks. These include even the strategic information as well as Intellectual
Property Right (IPR) data -computer software programs, patented technology, know-
how, precious trademarks & trade names, design of semiconductor layout etc. Mobile
communication networks coupled with ongoing developments in area of ubiquitous
computing supported by the availability global Internet have already changed
dramatically the way we communicate, conduct business, and organize our society and
with current research and developments in sensor networks and pervasive computing.

We are even creating a new networked world with all important information
floating in wireless networks causing threat to the digitized data. In wired networks we
have to take care of front door security but available solutions do not apply to wireless
networks which have problem of backdoor security and with weak security solutions so
far available in wireless networks task of protecting information is much more difficult.

In this paper we propose solutions which will not only detect the attack on the
network but will also take appropriate counter measures to save integrity of wireless
networks. We also discuss the way of securing wireless networks as well as wired
networks and we have also included case studies of privacy breach and causes.

REFERENCES:-
1. Mema Roussopoulous Guido Appenzeller and Mary Baker. User-friendly access
control for public network ports. IEEE INFOCOM, 1999.
2. Elliot Poger and Mary Baker. Secure public internet access handler. December 1997.
3. Harald Welte. The netfilter framework. Linux Kongress, 2000.
4. Microsoft, msdn.microsoft.com. Microsoft Developer Network: Firewall API.
5. Symantec. Security response. Virus-Worm activity details.
6. Port knocking: http://www.portknocking.org/
7. Cisco: http://www.cisco.com/
8. Firewall: http://www.ipcortex.co.uk/wp/fw.rhtm
9. Tutorial on wireless security at Comsware-2006

PROJECT ASSOCIATES:

1. Kuldeep Kumar Dhiman - D-24


2. Kumar Rohit - D-25
3. Prerana Bhardwaj - D-39
4. Pragya Prasad - D-38
5. Geeta Goel - D-19
6. Madhulika Singh - D-26

You might also like