Repository of colleges and higher education institutions

Show document
A+ | A- | Help | SLO | ENG

Title:Varnost e-poslovanja, zaščita podatkovnih informacij ter IKT sistemov v državni upravi : magistrska naloga
Authors:ID Štojs, Martin (Author)
ID Damij, Nadja (Mentor) More about this mentor... New window
Files:.pdf MAG_2014_Martin_Stojs.pdf.pdf (4,32 MB)
MD5: FB924E0F69AD5D2B920543E7166A12C6
 
Language:Slovenian
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:FIŠ - Faculty of Information Studies in Novo mesto
Abstract:Zaščita informacijskih sistemov vključuje sprejemanje ustreznih ukrepov in aktivnosti, kako zaščititi svoje podatke in dokumente, s katerimi razpolaga, od nepredvidenih dogodkov z nezaželenimi posledicami. Kompleksni procesi, ki potekajo v okviru računalniškega sistema, se niti v enem trenutku ne smejo podcenjevati, kajti nevarnosti lahko ogrožajo procese in v manjši ali večji meri predstavljajo grožnjo sistemu informacijske komunikacijske tehnologije (IKT) in njegovi zmogljivosti. Grožnje so tako številne, med seboj povezane in prepletene, da lahko v celotnem informacijskem sistemu tvorijo kompleksno mrežo nevarnosti. Zato je vse večja potreba, da se prepreči vsako naključno rušenje, onemogočanje ali omejevanje sistema. Prav tako je bistvenega pomena informacijska varnost organizacije, ki predstavlja ohranjanje zaupnosti, celovitosti in razpoložljivosti informacije in sistema IKT. Če želimo doseči celovito zaščito podatkov, si moramo pomagati s šifriranjem le-teh. Ti postopki omogočajo zaščito informacij pred morebitno izgubo ali krajo. Poseben pomen ima šifriranje podatkov, ko se informacije prenašajo preko nezavarovanih informacijskih kanalov.
Keywords:informacijska varnost, računalniški incident, upravljanje z incidenti, tveganja
Place of publishing:Novo mesto
Place of performance:Novo mesto
Publisher:[M. Štojs]
Year of publishing:2014
Year of performance:2014
Number of pages:89 str., [14] f. pril.
PID:20.500.12556/ReVIS-4918 New window
COBISS.SI-ID:2048308755 New window
UDC:004:659.2
Note:Na ov.: Magistrska naloga : študijskega programa druge stopnje;
Publication date in ReVIS:21.08.2018
Views:3226
Downloads:160
Metadata:XML DC-XML DC-RDF
:
Copy citation
  
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-NC-ND 4.0, Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Link:http://creativecommons.org/licenses/by-nc-nd/4.0/
Description:The most restrictive Creative Commons license. This only allows people to download and share the work for no commercial gain and for no other purposes.
Licensing start date:20.08.2018

Secondary language

Language:English
Abstract:Protection of information systems include the adoption of appropriate measures and activities, how to protect their information and documents in its possession of incidents with unwanted consequences. Complex processes that take place within a computer system is not one moment should not be underestimated because the danger can threaten processes and , to a lesser or greater extent pose a threat to the ICT system and its capabilities. Threats are so numerous , interconnected and intertwined that the entire information system form a complex network threats. It is therefore a growing need to prevent any accidental demolition, disable or limit system. It is also essential to information security organization representing the preservation of confidentiality, Integrity and availability of information and ICT systems. If we are to achieve a comprehensive data protection we need help with coding them. Of particular importance is data encryption when information is transmitted over unsecured channels of information.
Keywords:information security, computer incident, IT incident managment, incidents, risks, encryption


Back