Repository of colleges and higher education institutions

Show document
A+ | A- | Help | SLO | ENG

Title:Tehnično preverjanje stanja kibernetske varnosti v podjetju : Diplomska naloga
Authors:ID Kuhelj, Matic (Author)
ID Potokar, Marko (Mentor) More about this mentor... New window
Files:.pdf RAZ_Kuhelj_Matic_i2020.pdf (2,54 MB)
MD5: B1374C3B1B9E6104FE40D988EDD4DD68
 
Language:Slovenian
Work type:Bachelor thesis/paper
Typology:2.11 - Undergraduate Thesis
Organization:FIŠ - Faculty of Information Studies in Novo mesto
Abstract:Hitrost razvoja informacijske tehnologije je vedno hitrejša in posledično se tudi vedno več naprav povezuje v svetovni splet. Če se malo zamislimo, katere vse naprave se povezujejo v svetovni splet, kaj hitro pridemo do spoznanja, da se v svetovni splet povezujejo skoraj vse naprave. Vsaka naprava, ki se je sposobna povezati v splet, pa pomeni ranljivost oziroma morebitno nevarnost bodisi zaradi napake v delovanju oziroma programski kodi ali pa v napaki same konfiguracije. Zavedati pa se tudi moramo, da v podjetjih gledajo na IT-kader kot nekaj, kar jim povzroča strošek, in ne nekaj, kar je nujno potrebno za nemoteno delovanje podjetja. Zaposleni v IT-oddelkih so velikokrat preobremenjeni in vse, kar morajo narediti, naredijo na hitro. Prav tako v IT-oddelkih ne namenijo dovolj časa za razna izobraževanja, da bi se IT-kader naučil pravilno in varno konfigurirati naprave ter izvesti osnoven varnostni pregled.
Keywords:heker, ranljivosti, penetracijsko testiranje, kibernetska varnost, konfiguracija, varnostni pregled
Place of publishing:Novo mesto
Place of performance:Novo mesto
Publisher:{M. Kuhelj}
Year of publishing:2020
Year of performance:2020
Number of pages:XV, str. 79
PID:20.500.12556/ReVIS-6897 New window
COBISS.SI-ID:33033731 New window
UDC:621.391:005.934(043.2)
Note:Na ov.: Diplomska naloga : visokošolskega strokovnega študijskega programa prve stopnje;
Publication date in ReVIS:01.10.2020
Views:2942
Downloads:224
Metadata:XML DC-XML DC-RDF
:
Copy citation
  
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-NC-ND 4.0, Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Link:http://creativecommons.org/licenses/by-nc-nd/4.0/
Description:The most restrictive Creative Commons license. This only allows people to download and share the work for no commercial gain and for no other purposes.
Licensing start date:01.10.2020

Secondary language

Language:English
Abstract:The development of information technology is increasingly faster and, as a consequence, more and more devices get connected to the world web. If we think about all the devices connected to the world web, we soon realise that it connects almost all devices. Every device that can be connected to the world web also presents vulnerability or a possible danger, either due to a defect in functioning, programming code or the configuration itself. Moreover, we have to take into account that companies perceive IT employees as an expense, not as an asset necessary for the company to function and conduct business smoothly. Since IT employees are often overburdened, they do everything they have to do too quickly. Furthermore, in the IT department, they do not devote enough attention to trainings, which would help them learn how to properly and safely configure devices. An improper configuration and other types of vulnerability give rise to the so-called hackers, who try to take control over devices.
Keywords:hacker, vulnerability, penetration testing, cybersecurity, configuration, security check


Back