| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document Help

Title:Informacijska varnost in Aruba brezžične dostopne točke : diplomsko delo visokošolskega študijskega programa Informacijska varnost
Authors:ID Kos, Luka (Author)
ID Markelj, Blaž (Mentor) More about this mentor... New window
Files:.pdf VS_Kos_Luka_2022.pdf (1,76 MB)
MD5: AC2EA945560DD380C9A0698C722653D1
 
Language:Slovenian
Work type:Bachelor thesis/paper
Typology:2.11 - Undergraduate Thesis
Organization:FVV - Faculty of Criminal Justice and Security
Abstract:V današnjem času se ljudje vedno bolj zanašamo na tehnologijo, ki pa se usmerja proti brezžičnemu delovanju. Cilj diplomskega dela je bil opredeliti informacijsko varnost, vezano na brezžična omrežja. Opredelitev je navedena v teoretičnem delu diplomskega dela. Ta se deli na splošno informacijsko varnost, v sklopu katere so izpostavljeni vidiki, specifični brezžičnim omrežjem. Drugi del je posvečen segmentaciji informacijskih omrežij, ki je tudi podrobneje opisana. Ustvarjeno znanje je nato preneseno na pregled omrežne naprave, ki je bila izposojena in vključena v raziskavo. Ta se začne z obsežnim pregledom naprave. Poleg opisov so podane slike uporabniškega vmesnika, s katerim smo lahko upravljali omrežno napravo. To je bila tudi izhodiščna točka naše raziskave. Na koncu je ustvarjena primerjava med različnimi primerljivimi napravami na trgu. Za to je bila uporabljena izposojena naprava, ki nam je bila ves čas na voljo za pregled, ostale pa so bile ocenjene glede na pregled javnih virov. Ocenjevanje je potekalo na podlagi ustvarjenih kriterijev, ki so razdeljeni na tehnične podatke, varnost in uporabniški vmesnik. Ugotovitve so skladne z našimi pričakovanji. Ker smo izbrali primerljive naprave različnih ponudnikov, so si njihove funkcije in specifikacije med seboj zelo podobne. Pri majhnih odstopanjih v napravah se opazi konkurenčnost trga, ki narekuje trend prodajanih izdelkov. Vseeno pa so prisotne razlike, ki odražajo določene prioritete proizvajalca. Razlike se pojavljajo na različnih področjih in ne pomenijo vedno razlike v varnosti uporabnikov ali omrežja. Čeprav so odstopanja na področju varnosti, pa so ta prisotna izključno na tehnični ravni, ki spremeni samo določeno uporabniško izkušnjo.
Keywords:informacijska varnost, brezžična omrežja, segmentacija, diplomske naloge
Place of publishing:Ljubljana
Place of performance:Ljubljana
Publisher:[L. Kos]
Year of publishing:2022
Year of performance:2022
Number of pages:VIII f., 45 str.
PID:20.500.12556/DKUM-82769 New window
UDC:004.056(043.2)
COBISS.SI-ID:124988675 New window
Publication date in DKUM:10.10.2022
Views:735
Downloads:28
Metadata:XML RDF-CHPDL DC-XML DC-RDF
Categories:FVV
:
Copy citation
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-NC-ND 4.0, Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Link:http://creativecommons.org/licenses/by-nc-nd/4.0/
Description:The most restrictive Creative Commons license. This only allows people to download and share the work for no commercial gain and for no other purposes.
Licensing start date:06.09.2022

Secondary language

Language:English
Title:Cybersecurity and Aruba wireless access points
Abstract:Nowadays, people are more and more reliant on technology, which strives to become entirely wireless. The goal of this paper was to define cybersecurity associated with wireless networks, which is outlined in the theoretical part of this paper. The first section of the theoretical part presents cybersecurity, including aspects specific for wireless networks, and the second section details the segmentation of information networks. In the next phase, the acquired knowledge was used in a detailed inspection of a network device, borrowed and included in the research. In addition to descriptions, pictures of a user interface used to control the network device are provided, which was the starting point of our research. In the end, comparison between different comparable devices in the market is drawn, using a borrowed device, which was available for inspection throughout the entire research, while other devices were evaluated based on the inspection of public resources. The evaluation was carried out following the established criteria, addressing technical data, security and user interface. The findings complied with our expectations. Since comparable devices from different suppliers were selected, their functions and specifications were very similar. Smaller deviations in the devices are a result of market competitiveness, setting trends for selling products. However, differences showing certain manufacturers’ priorities are still visible – they arise in different areas and they do not always mean a different level of user or network security. Even though these differences are associated with security, they are also present on the technical level, which affects only certain user experience.
Keywords:cybersecurity, wireless networks, segmentation


Comments

Leave comment

You must log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica