Company Security Reporting System(CSRS)

Company Security Reporting System(CSRS)

Abstract:

To Develop a CSRS System for a network ,which should study the hackers behaviour and store it in a DataBase.

CSRS can play a key role in a defensive strategy. While there are many studies and sources for information, there is no single source that discusses the major strategic issues concrerning CSRS. The main attraction of a CSRS is not limited to what you can learn but how you can learn it. As a result, a CSRS fits into the defensive plan as a way of

 Studing blackhat activity.
 Developing a reasoned response to the threat,
 Testing and developing new responses and tactics to a given threat, and
 CSRS can also slow down another attack thus allowing time to develop a countermeasure.

CSRS help to develop a reasoned, proactive response to a threat. In addition, they facilitate the building of contingencies thus contributing to the need to know what you don’t know in good project management practices. CSRS are no panacea. There are significant risks and exposures to the organization if objectives are not well defined, do not implement a CSRS just for its own sake.
The primary issues to be addressed fall into two categories: Administrative/Policy and Technical.
The Administrative/Policy category covers legal, liability and misuse of data issues, while the Technical category relates to the choice of building or buying a CSRS placement of the CSRS and support issues.
We have seen that the use of policy and procedures to manage these issues can go a long way to solve them. Some liability issues such as ‘Uplink Liablility’ can be managed by sound configuration of the technical environment.
When configuring a CSRS, there areas of data management to consider: Data Control, Data Capture and, Data Collection.
Consideration must be given to both of these major categories before proceeding to implement a CSRS else; there is a significant risk of exposing the organization to both monetary and legal sanctions. Resolving these issues will build a better CSRS and help in ongoing management.

Language used: Java, oracle 8i

Modules.

1.Data Control
2.Data Capture
3.Data Collection
4.Create CSRS GUI
5.CSRS Login
6.CSRS Reporting(log info) modules

1.Data Control:

In these module controls the activites of attackers by limiting options. The most common tool to achieve this is to use a firewall capable of limiting the number of outbound connections.

2.Data Capture:

This is to record all of the activities on the Company Security Reporting System(CSRS) and contains three layers. By studing these datas we can improve the firewall in future.

3.Data Collection:

This function is necessary if you are operating more than one CSRS. This layer provides the capability to collect data from remote sites and transfer them to one central location.

4.Create CSRS GUI
Using this module the administrator can easily handle a secure file in coorperate and also he can list a restricted ip address and allowed ip address and he can add other system constrains.

5.CSRS Login

This module will provide login for users and adminstrator.

6.CSRS Reoporting(log info) modules

This report is generated by CSRS server to administrator it contain information about a introduers

System Requirements:

Hardware Requirements:

 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.

Software Requirements:

 Operating system : Windows XP.
 Coding Language : ASP.Net with C#
 Data Base : SQL Server 2005


Comments are closed.