self defending network
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Jun 2010
28-06-2010, 09:03 PM

report and slide on the topic
Active In SP

Posts: 2
Joined: Jul 2010
05-07-2010, 10:49 AM

can anyone tell me where i can get the full report on self defending networks???
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
23-09-2010, 10:42 AM

some brief explanation about the self defending network from cisco is :::--

Cisco Self-Defending Network: Combining Best-of-Breed Products and Services with a Systems Approach
A new generation of interactive business communication and collaboration technologies provides tremendous productivity and flexibility gains for organizations of all kinds. But this unprecedented connectivity also unleashes new, complex security risks, including:

Increased exposure to security threats—Ubiquitous access to Web-enabled applications and services enables users to work from anywhere, anytime—but also places businesses at risk anywhere, anytime.

An eroding network perimeter—The traditional network barriers that separated trusted from untrusted and “inside” from “outside” are now disappearing. As more applications become directly accessible to remote users and systems, the concept of the network perimeter becomes increasingly vague and more difficult to protect.

Evolving threats—Information attacks of the past were largely an issue of cyber-vandalism, with hackers primarily looking for fame. Today’s attacks are a profit-driven business, often controlled by organized crime. The modern attacker uses a patient, “stealth” approach to eventually achieve a successful attack. In addition, modern attackers often avoid technology defenses, using spam, phishing attacks, and fraudulent Web links to target an organization’s weakest link: human beings.
As security risks have evolved, so have organizations’ approaches to them. Where information security was once a technology issue, today it is a business issue—representing a more significant cost and operational challenge, but a fundamental business enabler as well. More and more organizations are implementing formal programs to reduce IT risk, especially security and compliance risks. As regulatory compliance becomes a core requirement for organizations in more industries, businesses must develop new capabilities for controlling the kinds of information traversing their network, how that information is used, and who can access it. Organizations not only face the challenge of becoming compliant, but of staying compliant as the network continuously evolves with business needs.
“When we build a security environment that is flexible, manageable, and layered, we can handle any new challenges that may appear. Our Cisco solution definitely gives us this capability.”
—Al Grapoli, network manager, State of Oregon
Organizations are wrestling with information security demands that span many overarching business challenges such as complying with regulatory requirements, preventing data loss, and blocking malware. The problem is that dealing with these types of challenges requires a true security solution—not just security products. To prevent data loss alone, for example, businesses need a combination of strong perimeter defenses, malware defenses, identity services, endpoint security, policy enforcement mechanisms, and security monitoring tools, as well as a strong plan
© 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

refered by :::-

computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
18-11-2010, 01:20 PM

its a new technology
read some latest article about self defending network like
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 4
Joined: May 2011
29-06-2011, 06:18 PM

plz send me the abstract and report of "Self Defending networks".
smart paper boy
Active In SP

Posts: 2,053
Joined: Jun 2011
30-06-2011, 09:46 AM

Hi refer the following links for more details of self defending network


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Network Hospital Tamilmani 0 487 03-06-2013, 08:33 PM
Last Post: Tamilmani
  Radio Network Controller Srikanth Kola 1 524 28-02-2013, 10:24 AM
Last Post: seminar tips
  multi terabit network sridharb1 2 2,040 13-02-2013, 12:22 PM
Last Post: Guest
  self rechargeble paper thin- film batteries Guest 1 433 02-02-2013, 12:25 PM
Last Post: seminar tips
Photo network Guest 0 351 31-01-2013, 03:43 PM
Last Post: Guest
Last Post: Guest
  border security using wireless integrated network sensors Guest 2 811 25-01-2013, 09:46 AM
Last Post: seminar tips
  Artificial Neural Network-Based Face Recognition Guest 0 467 08-01-2013, 04:26 PM
Last Post: Guest
  mobile communication in network security Guest 0 472 24-12-2012, 02:43 PM
Last Post: Guest
  Cryptography And Network Security ppt lakshmi ravuri 7 14,815 01-11-2012, 01:15 PM
Last Post: project girl