| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document Help

Title:Kibernetska varnost
Authors:ID Šilak, Gaja (Author)
ID Bobek, Samo (Mentor) More about this mentor... New window
Files:.pdf MAG_Silak_Gaja_2023.pdf (10,60 MB)
MD5: 931C825472C76A57B76DFF28549E274B
 
Language:Slovenian
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:EPF - Faculty of Business and Economics
Abstract:V magistrskem delu bomo opredelili pojem kibernetske varnosti, prav tako se bomo posvetili tudi vrstam in izvajalcem kibernetskih napadov. Predstavili bomo penetracijsko testiranje s katerim se vedno bolj srečujejo podjetja na trgu z namenom, da ugotovijo ranljivosti svojih sistemov in izboljšajo varnost znotraj podjetja. Varnost informacijske tehnologije je zaščita računalniških sistemov, omrežij in podatkov pred nepooblaščenim dostopom, krajo, poškodbo ali drugimi vrstami kršitev varnosti. Zagotavlja zaupnost, celovitost in razpoložljivost informacij in virov ter nepooblaščenim uporabnikom preprečuje dostop do občutljivih informacij ali sistemov. Cilj kibernetske varnosti je zmanjšati možnosti za napad na računalniške sisteme in omrežja ter omejiti škodo, ki jo lahko povzroči uspešno izkoriščanje ranljivosti. Izkoriščanje se nanaša na uporabo ranljivosti ali slabosti v računalniških sistemih ali omrežjih za pridobitev nepooblaščenega dostopa ali izvajanje drugih zlonamernih dejanj. Izkoriščanje je lahko v različnih oblikah, na primer z uporabo zlonamerne programske opreme, socialnega inženiringa ali hekerskih tehnik za pridobitev dostopa do sistemov, krajo informacij ali motenje poslovnih dejavnosti. Iz tega izhaja penetracijsko testiranje, kjer podjetja z namenom ugotovitve potencialnih ranljivosti najamejo profesionalne hekerje. V drugem delu magistrskega dela bomo predstavili rezultate naših poizkusov vdora in izkoriščanja ranljivosti v predpripravljene sisteme. Iz praktičnega dela bomo izhajali in prišli do zaključkov in smiselnih napotkov za zagotovitev boljše kibernetske varnosti.
Keywords:informacijska varnost, kibernetska varnost, računalniške ranljivosti, hekerji, socialni inženiring, penetracijski test
Place of publishing:Maribor
Publisher:G. Šilak
Year of publishing:2023
PID:20.500.12556/DKUM-84169 New window
UDC:004.056.53
COBISS.SI-ID:161719043 New window
Publication date in DKUM:21.08.2023
Views:813
Downloads:280
Metadata:XML DC-XML DC-RDF
Categories:EPF
:
Copy citation
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-NC-ND 4.0, Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Link:http://creativecommons.org/licenses/by-nc-nd/4.0/
Description:The most restrictive Creative Commons license. This only allows people to download and share the work for no commercial gain and for no other purposes.
Licensing start date:23.04.2023

Secondary language

Language:English
Title:Cyber security
Abstract:In this Master's thesis we will define the concept of cyber security, and we will also look at the types and perpetrators of cyber attacks. We will present penetration testing, which is increasingly being used by companies in the market to identify vulnerabilities in their systems and improve security within the company. IT security is the protection of computer systems, networks and data from unauthorised access, theft, damage or other types of security breaches. It ensures the confidentiality, integrity and availability of information and resources and prevents unauthorised users from gaining access to sensitive information or systems. The aim of cyber security is to reduce the chances of attacks on computer systems and networks and to limit the damage that can be caused by the successful exploitation of vulnerabilities. Exploitation refers to the use of vulnerabilities or weaknesses in computer systems or networks to gain unauthorised access or perform other malicious acts. Exploitation can take many forms, such as the use of malware, social engineering or hacking techniques to gain access to systems, steal information or disrupt business activities. This leads to penetration testing, where companies hire professional hackers to identify potential vulnerabilities. In the second part of the master thesis, we will present the results of our attempts to penetrate and exploit vulnerabilities in pre-built systems. From the practical work we will draw conclusions and come up with meaningful guidance to ensure better cyber security.
Keywords:information security, cyber security, computer vulnerabilities, hackers, social engineering, penetration testing


Comments

Leave comment

You must log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica