Professional Documents
Culture Documents
Assignment 1
Assignment 1
Choose any topic (1 topic 1 student) and submit one page assignment and submit till 12.11.2016.
Below are Wikipedia topic and if you CTRL + Click over any topic it will open in the browser. Of
course you will make your own, only 30% plagiarism is allowed. Attach screenshot of plagiarism
from http://smallseotools.com/plagiarism-checker/.
A [1004-1008]
Aanval
Advanced Intrusion Detection Environment
AirSnort
Anti-phishing software
Anti-Subversion Software
Anti-tamper software
Apache Rampart module
Armitage (computing)
ArpON
AssureSign
Astalavista.box.sk
Attack surface
Attack Surface Analyzer
Authbind
Avast Software
Avira
B [1009-1010]
BeyondTrust
BLADE (software)
BNC (software)
BotHunter
Bro (software)
Burp suite
C [1011,1013]
D [1014]
Delphish
Denuvo
Talk:Denuvo
DSploit
E [1015, 1021]
F [1022]
Fail2ban
FinFisher
ForeScout Technologies
FreeRADIUS
Fully undetectable
G [1023]
GoGuardian
Google App Runtime for Chrome
Google Native Client
H [1024]
Hack trapper
Hacking Team
HDDerase
HERAS-AF
I [1025-1027]
Idle scan
Insider threat management
JBoss SSO
Anti-keylogger
Logical security
M [1029-1032]
Mausezahn
Md5deep
Microsoft Forefront
Microsoft Forefront Threat Management Gateway
Microsoft Forefront Unified Access Gateway
Muffin (proxy)
N [1035-1038]
Nessus (software)
NetIQ Access Manager
Network Security Toolkit
Nikto Web Scanner
Norton AntiBot
Numina Application Framework
O [1039-1040]
P [1041-1044]
Packet Sender
Padvish Antivirus
Paramount Defenses
PERMIS
Petname
PhishTank
Port scanner
PrivacyIDEA
Proofpoint, Inc.
Proxy list
Proxy server
R [1046]
Rkhunter
RootkitRevealer
Rublon
Runas
S [1047-1053]
SaferSurf
Safetica Technologies
Sagan (software)
SAINT (software)
SAML 1.1
SAML 2.0
Scapy
Secure input and output handling
Securebox
Security Administrator Tool for Analyzing Networks
Security Descriptor Definition Language
Security event manager
Security information and event management
Security token service
SekChek Classic
SekChek Local
Sendmail, Inc.
Snare (software)
Snort (software)
SpywareGuard
Stockade (software)
Sudo
SuEXEC
Suhosin
Suricata (software)
Sysjail
T [1055]
U [1056]
USBKill
Usher (software)
V [1057-1058]
Veracode
Vigilant Technology
VirusBuster
Vulnerability scanner
W [1059-63]
W3af
WarVOX
Web application security scanner
Windows Live OneCare Safety Scanner
Winlogon
Winzapper
WOT Services
WS-Security
WS-Security based products and services
Z [1066]
Zemana
ZmEu (vulnerability scanner)
Zooko's triangle
Misc [1067-1069]
Clarified Networks
Network mapping
Packet Analyzer
Assignment-1 Network Security, (BSIT – 7th Evening)
Choose any topic (1 topic 1 student) and submit one page assignment and submit till 12.11.2016.
Below are Wikipedia topic and if you CTRL + Click over any topic it will open in the browser. Of
course you will make your own, only 30% plagiarism is allowed. Attach screenshot of plagiarism
from http://smallseotools.com/plagiarism-checker/.
A [3001]
Aircrack-ng
AirSnort
Argus - Audit Record Generation and Utilization System
ArpON
C [3002]
D [3003]
DRDO NETRA
DSniff
Ettercap (software)
Fiddler (software)
FlowMon
H [3004]
Hping
Ipsectrace
Ipswitch, Inc.
Isyvmon
J [3005]
Justniffer
KisMAC
Kismet (software)
M [3007]
N [3008-10]
Naemon
Nagios
NeDi
Nessus (software)
Netcat
Netsniff-ng
Network intelligence
Network Security Toolkit
Network weathermap
Ngrep
Nimsoft
Nmap
Ntop
Ntopng
O [3011]
OmniPeek
Openkore
OpenVAS
P [3012, 3014, 3015]
PA Server Monitor
Packet analyzer
Packet crafting
Packet generator
Packet Sender
Packetsquare
PacketTrap
Paessler Router Traffic Grapher
Panorama9
Paping
PathPing
Pcap
Ping (networking utility)
Pirni
Plink
Prefix WhoIs
Promiscuous mode
S [3017-3018]
SAINT (software)
ScienceLogic
Security Administrator Tool for Analyzing Networks
Shinken (software)
SNMPTT
Snoop (software)
SolarWinds
Sparrowiq
SQLFilter
T [3020]
U [3021]
University Toolkit
URL Snooper
W3af
WarVOX
Weplab
Wireshark
X [3022]
Xplico
Xymon
Zx Sniffer
Ipswitch, Inc.
N
Netcat
Nmap
P
PacketTrap
Panorama9
Plink
S
ShieldsUp
SolarWinds
Sparrowiq
Superscan
[3028-3037]
Email authentication
A
Bitmessage
Bounce address
Bounce Address Tag Validation
C
DMARC
DNSWL
DomainKeys
DomainKeys Identified Mail
E
Email encryption
F
Hashcash
I
Ident protocol
M
MAAWG
MARID
Message submission agent
N
Bounce message
P
S/MIME
Sender ID
Sender Policy Framework
Sender Rewriting Scheme
SMTP Authentication
T
TXT record
V
Vouch by Reference
A [3038-3042]
Bell–LaPadula model
Bitium
CCID (protocol)
Challenge–response authentication
Closed-loop authentication
Comparison of privilege authorization features
Computational trust
Computer access control
Context-based access control
Copy protection
Credential lag
Cryptographic log on
D [3044-3047]
DACL
Database audit
Delegated administration
Delegation (computer security)
Delegation of Control
Digital identity
Directory service
Discretionary access control
Distributed Access Control System
Draw a Secret
EAuthentication
Federated identity
FinFisher
Form-based authentication
FreeOTP
G [3049-3054]
GB & Smith
Gigya
Global Trust Council
Google Authenticator
Graph-based access control
Hacking Team
HERAS-AF
HTTP cookie
HTTP+HTML form-based authentication
LinOTP
Location-based authentication
Logical access control
Login
Login manager
LOMAC
M [3056-3060]
Draft:Macaroons (authorization)
Mandatory access control
MicroID
Microsoft Fingerprint Reader
Mobilegov
Multi-factor authentication
MultiOTP
Mutual authentication
N
NemID
NIST RBAC model
Nitrokey
Numina Application Framework
O
OAuth
Object-capability model
One-time authorization code
One-time password
OneLogin
Organisation-based access control
P
PassWindow
Pre-boot authentication
PrivacyIDEA
R
Regin (malware)
Registered user
Richacls
Risk-based authentication
Role hierarchy
Rublon
S
SAML 2.0
SAML-based products and services
Secure attention key
Security Assertion Markup Language
Security question
Security token
Security token service
Sign-on server
Single sign-on
SiteKey
Social login
Software token
Spring Security
Strong authentication
Stuxnet
Subscriber identity module
Universal controls
Usability of web authentication systems
User-Managed Access
Vidoop
VOMS
Wilmagate
WS-Federation
WS-Trust
YubiKey