| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document Help

Title:HEKERSKI NAPADI - ZGODOVINA IN POSLEDICE
Authors:ID Dulić, Almedina (Author)
ID Brumen, Boštjan (Mentor) More about this mentor... New window
Files:.pdf VS_Dulic_Almedina_2015.pdf (904,45 KB)
MD5: F69B56EBCCF668B0105EE5B6A7D2E4F0
 
Language:Slovenian
Work type:Bachelor thesis/paper
Typology:2.11 - Undergraduate Thesis
Organization:FERI - Faculty of Electrical Engineering and Computer Science
Abstract:V diplomskem delu obravnavamo hekerske napade skozi zgodovino in njihove posledice. V prvem delu naloge je predstavljen opis informacijskih sistemov in hekerskih napadov ter njihov način uporabe določenih orodij in metod. V nadaljevanju je opisan nastanek in razvoj hekerskih napadov skozi zgodovino ter prikaz najodmevnejših hekerskih napadov v zadnjem času, vključno z njihovimi posledicami. Zadnji del naloge opisuje najpogostejše postopke in orodja za zaščito pred napadi na informacijske sisteme ter podrobno predstavitev zaščite elektronskega bančništva pred njimi.
Keywords:heker, hekerski napad, informacijski sistemi, zgodovina hekerskih napadov, posledice hekerskih napadov
Place of publishing:[Maribor
Publisher:A. Dulić
Year of publishing:2015
PID:20.500.12556/DKUM-55328 New window
UDC:004.056:004.775(043.2)
COBISS.SI-ID:19387926 New window
NUK URN:URN:SI:UM:DK:SKKJQ9TM
Publication date in DKUM:19.11.2015
Views:2432
Downloads:482
Metadata:XML DC-XML DC-RDF
Categories:KTFMB - FERI
:
Copy citation
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Secondary language

Language:English
Title:HACKER ATTACKS - HISTORY AND CONSEQUENCES
Abstract:We have been researching hacker attacks through history and their consequences. The first part of the thesis presents a description of information systems, hacker attacks and their way of using different tools and methods. The origin and development of hacker attacks throughout history is described in continuation and a presentation of the most publicized hacker attacks nowadays, including their consequences. The last part of the thesis describes the most frequent procedures and tools for protection against the attacks on information systems and a detailed presentation of electronic banking protection against the attacks.
Keywords:hacker, hacker attack, information systems, history of hacker attacks


Comments

Leave comment

You must log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica