Sunday 8 May 2011

Mobile Ad Hoc Networks(MANETS)

 
       In this security seminar, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyzed the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we surveyed the current security solutions for the mobile ad hoc network
this is how manets make self organization:

Saturday 7 May 2011

Virtual Private Networks(VPN) conducted by Mr.KHALID

        Really,we were so happy to meet the the speaker invited by Prof Dr Hanan who is one of the PHD candidate students to share with us his knowledge about the VPN. Mr Khalid  started his talk by asking us unexpected questions about VPN. Although we tried our best but,could;t so sophisticated as he was.Then, he deeply explained and discussed the introduction,the function and the idea behind VPN. I can remember one of the definitions he gave to VPN"is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any insecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data."In addition, VPNs are frequently used by remote workers or companies with remote offices to share private data and network resources. VPNs may also allow users to bypass regional internet restrictions such as firewalls, and web filtering, by "tunneling" the network connection to a different region.
This the real simulation  for VPN:


Security Seminar breifing conducted by Prof. Dr Hanan in January 2011

         Apparently, the first  class which we attended  for the security Seminar conducted by the Dean of Faculty of Computer Science and Information System(UTM). Just all the lecture was about self introduction assigned for each person to give some information about his background. suddenly ,every body started to share and tell him/her name ,educational background. Secondly, the Dean suggested to divide the class into two divisions because for because the number of seats intended for the seminar were not enough.Finally, every one was there  grappled some  important points about the current security issues in the field  of information security.