| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document

Title:Etični heking : magistrsko delo
Authors:Tomše, Sara (Author)
Markelj, Blaž (Mentor) More about this mentor... New window
Dvojmoč, Miha (Co-mentor)
Files:.pdf MAG_Tomse_Sara_2019.pdf (936,85 KB)
 
Language:Slovenian
Work type:Master's thesis/paper (mb22)
Typology:2.09 - Master's Thesis
Organization:FVV - Faculty of Criminal Justice and Security
Abstract:Zaradi nenehnega razvoja tehnologije se trendi informacijske varnosti spreminjajo zelo hitro. To predstavlja svojevrstne izzive podjetjem, ki se morajo odločiti, na kakšen način bodo varovala svojo infrastrukturo, informacije in podatke. Na voljo je veliko različnih metod upravljanja informacijske varnosti, ki temeljijo na dobrih praksah. Istočasno se ponuja možnost certificiranja in sistematičnega preverjanja varnosti. Porajajo se nova vprašanja o uporabi storitev v oblaku in zagotavljanju varnosti informacij na takšnih oddaljenih strežnikih. Podjetja morajo zagotoviti zadostno varnost svojih informacijskih sistemov, da lahko ostanejo konkurenčna na trgu. Pri tem morajo zagotoviti ustrezne mehanizme kontrole, da bi z racionalizacijo stroškov zagotovila najvišjo raven zaščite. Ugotovili smo, da avtorji in strokovnjaki na področju informacijske varnosti zelo različno interpretirajo razlike med etičnim hekingom in penetracijskim testiranjem. Sočasno zakonodaja eksplicitno ne definira etičnega hekinga. Sicer definira, kaj je napad na informacijski sistem, vendar se moramo zavedati, da med dejanji, ki so kazniva, in med delovanjem etičnih hekerjev glede na modus operandi ni nobenih razlik. Edina razlika je ta, da gre pri etičnem hekingu za pogodbeni dogovor med dvema strankama. Z magistrskim delom smo želeli predstaviti etični heking, kot ga danes definira teorija in razumejo posamezniki. Na začetku magistrskega dela smo predstavili raziskovalne trditve, ki se navezujejo na percepcijo etičnega hekinga. S sistematičnim pregledom literature smo želeli pridobiti celostni vpogled v problematiko informacijske varnosti in z njo povezanega etičnega hekinga. V drugem delu smo predstavili rezultate raziskave o etičnem hekingu, ki odražajo mnenje slovenskih uporabnikov spleta in strokovnjakov s področja informacijske varnosti v slovenskem prostoru.
Keywords:poslovni sistemi, informacijska varnost, heking, etični heking, vprašalniki, intervjuji, analize, magistrska dela
Year of publishing:2019
Year of performance:2019
Place of performance:Ljubljana
Publisher:[S. Tomše]
Number of pages:VIII, 102 str.
Source:Ljubljana
UDC:004.056(043.2)
COBISS_ID:3759082 Link is opened in a new window
NUK URN:URN:SI:UM:DK:NBAFUQPC
Views:23
Downloads:9
Metadata:XML RDF-CHPDL DC-XML DC-RDF
Categories:FVV
:
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:AddThis
AddThis uses cookies that require your consent. Edit consent...

Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Secondary language

Language:English
Title:Ethical hacking
Abstract:Information security trends change very quickly due to the continuous development of technology. This represents a unique challenge for companies that need to decide how they are going to protect their infrastructure, information, and data. There are many different methods of information security management based on good practices. At the same time, there are possibilities for certification and systematic security checks. New questions arise about the usage of cloud services and how to provide comprehensive security on those remote servers. Organizations must ensure that their information systems are sufficiently secured so that they can remain competitive on the market. In doing so, they have to provide appropriate control mechanisms to ensure the highest level of protection by streamlining their costs. We found that authors and experts in the field of information security interpret the differences between ethical hacking and penetration testing very differently. At the same time, the legislation does not explicitly define ethical hacking. It defines what an attack on the information system is but we have to be aware that there are no differences between the acts of criminals and behavior of ethical hackers in terms of their modus operandi. The only difference is that ethical hacking is a contractual agreement between two parties. With this master's thesis, we wanted to present the ethical hacking as it is today defined by theory and understood by individuals. At the beginning of this thesis, we presented hypotheses related to the perception of ethical hacking. With a systematic review of the theoretical field, we wanted to gain a comprehensive insight into the problematics of information security and its relation to ethical hacking. In the second part, we presented the results of research on ethical hacking which reflects the opinion of Slovenian web users and experts in the information security field in Slovenia.
Keywords:ethical hacking, penetration testing, intrusion tests, white hat hackers.


Comments

Leave comment

You have to log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica