Top Banner
WELCOME
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Welcome

WELCOME

Page 2: Welcome

SAGAR INSTITUTE OF TECHNOLOGY & MANAGEMENT,BARABANKI

PRESENTATION OF MAJOR PROJECT

ON

INFORMATION SECURITY AND NETWORK MANAGEMENT

PRESENTED BY:GAURAV SHUKLA -IT 4TH YEAR

TARUN KUMAR SRIVASTAVA-IT 4TH YEAR

Page 3: Welcome

INTRODUCTION“Information Security & Network

Management” project deals with the creation of a Linux based network and security.

The project provides security features as well as handles network management of a company named “WEBRIDGE SYSTEMS”.

The project mainly consists of servers namely –

file server, mail server, web server and domain name servers.

Page 4: Welcome

WEBRIDGE SYSTEMWebridge Systems is one of the pioneers in

providing I.T infrastructure and solutions on various platforms.

We handle the relationship and take on the spot decisions.

Webridge Systems uses technology as a means to empower customers by providing them with user friendly solutions that enhance productivity.

Page 5: Welcome
Page 6: Welcome

Webridge System has following departments:-IT Department:- This department is working

to put technology to its highest and best effective use.

SALES Department:- This department has a

crucial role in the sales of products.

Page 7: Welcome

PURCHASE Department:- This

department is responsible for co-ordinating the acquisition of goods and services.

FINANCE Department:- This department

deals with the financial matters and act as a bridge between Webridge and clients.

Page 8: Welcome
Page 9: Welcome

INTRODUCTION TO LINUXLinux is a generic term referring to Unix-like

computer operating systems based on the Linux kernel.

Linux can be installed on a wide variety of computer hardware, ranging from embedded devices such as mobile phones, smartphones and wristwatches to mainframes and supercomputers.

Linux is the most secure operating system, therefore, most of the severs are using Linux operating system.

Page 10: Welcome
Page 11: Welcome

Basic Linux Commands Usedpwd: Displays the path for current working

directory. ls: Lists files and subdirectories in a directory. ls –l: Gives a long listing for files and

subdirectories in a directory. ls –la : Displays also hidden files in addition. exit: Ends current session. touch: Creates a new empty file.

Page 12: Welcome

mkdir: Create a new directory. cd: Change directory. rmdir: Removes empty directory. cat: Concatenate files or read files. cp: Copy files from one directory to other. mv: Moves file from one directory to other. rm: Removes files and directory.

Page 13: Welcome

NETWORK MANAGEMENTSubnetting:-

Splitting a single network into smaller, separate subnets reduces number of hosts per network is called subnetting.

Page 14: Welcome

Telnet:- It is a network protocol used on the

Internet or LAN to provide a bidirectional interactive text-oriented communications facility(port number 23).

Page 15: Welcome

Web-Hosting:- We have done web hosting by

installing a predefined package called WEBMIN.

Webmin is a web-based interface for system administration.

Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and much more.

Page 16: Welcome
Page 17: Welcome

DOMAIN NAME SERVER(DNS)The Domain Name System maintains the

domain namespace and provides translation services between two namespaces.

Page 18: Welcome
Page 19: Welcome
Page 20: Welcome
Page 21: Welcome
Page 22: Welcome

WEB MAILThe mailing feature acts as a bridge between

different departments which connects employees of different departments.

Page 23: Welcome

SECURITY FEATURESFirewall:-

A Firewall is a device installed between the internal network and the global internet.

It is designed to forward some

packets and filter (not forward) others.

It act as a security of information flowing across the network.

Page 24: Welcome
Page 25: Welcome

Filter:- When a program performs operations on input and writes the result to the standard output, it is called a filter.

Through filter we can restrict unauthorized users from entering into unalloted work space.

Page 26: Welcome

Permissions:- Every file or folder in Linux has

access permissions. There are three types of permissions (what allowed to do with a file):

read access - 5 write access - 7

execute access - 1

Page 27: Welcome

CONCLUSION Our project is an information as well as network

management system to connect and automate all the department of the company.

The system contains various servers (DNS, Apache, Mail) that helps all the department of the company to upload all information.

The mail server developed as the part of the project will give the company a dedicated e-mail service for all management member and employees.

Page 28: Welcome

FUTURE SCOPESecurity measures can be enhanced by using

more secure protocol and hardware firewalls.

As the number of users increase, more account space will be required. At that time, moderation in user quota portioning will become a necessity.

Better connection solution is required so that users can access the network from remote locations.