Your browser does not allow JavaScript!
JavaScript is necessary for the proper functioning of this website. Please enable JavaScript or use a modern browser.
|
|
SLO
|
ENG
|
Cookies and privacy
DKUM
EPF - Faculty of Business and Economics
FE - Faculty of Energy Technology
FERI - Faculty of Electrical Engineering and Computer Science
FF - Faculty of Arts
FGPA - Faculty of Civil Engineering, Transportation Engineering and Architecture
FKBV - Faculty of Agriculture and Life Sciences
FKKT - Faculty of Chemistry and Chemical Engineering
FL - Faculty of Logistic
FNM - Faculty of Natural Sciences and Mathematics
FOV - Faculty of Organizational Sciences in Kranj
FS - Faculty of Mechanical Engineering
FT - Faculty of Tourism
FVV - Faculty of Criminal Justice and Security
FZV - Faculty of Health Sciences
MF - Faculty of Medicine
PEF - Faculty of Education
PF - Faculty of Law
UKM - University of Maribor Library
UM - University of Maribor
UZUM - University of Maribor Press
COBISS
Faculty of Business and Economic, Maribor
Faculty of Agriculture and Life Sciences, Maribor
Faculty of Logistics, Celje, Krško
Faculty of Organizational Sciences, Kranj
Faculty of Criminal Justice and Security, Ljubljana
Faculty of Health Sciences
Library of Technical Faculties, Maribor
Faculty of Medicine, Maribor
Miklošič Library FPNM, Maribor
Faculty of Law, Maribor
University of Maribor Library
Bigger font
|
Smaller font
Introduction
Search
Browsing
Upload document
For students
For employees
Statistics
Login
First page
>
Show document
Show document
Title:
Kibernetska varnost
Authors:
ID
Šilak, Gaja
(Author)
ID
Bobek, Samo
(Mentor)
More about this mentor...
Files:
MAG_Silak_Gaja_2023.pdf
(10,60 MB)
MD5: 931C825472C76A57B76DFF28549E274B
Language:
Slovenian
Work type:
Master's thesis/paper
Typology:
2.09 - Master's Thesis
Organization:
EPF - Faculty of Business and Economics
Abstract:
V magistrskem delu bomo opredelili pojem kibernetske varnosti, prav tako se bomo posvetili tudi vrstam in izvajalcem kibernetskih napadov. Predstavili bomo penetracijsko testiranje s katerim se vedno bolj srečujejo podjetja na trgu z namenom, da ugotovijo ranljivosti svojih sistemov in izboljšajo varnost znotraj podjetja. Varnost informacijske tehnologije je zaščita računalniških sistemov, omrežij in podatkov pred nepooblaščenim dostopom, krajo, poškodbo ali drugimi vrstami kršitev varnosti. Zagotavlja zaupnost, celovitost in razpoložljivost informacij in virov ter nepooblaščenim uporabnikom preprečuje dostop do občutljivih informacij ali sistemov. Cilj kibernetske varnosti je zmanjšati možnosti za napad na računalniške sisteme in omrežja ter omejiti škodo, ki jo lahko povzroči uspešno izkoriščanje ranljivosti. Izkoriščanje se nanaša na uporabo ranljivosti ali slabosti v računalniških sistemih ali omrežjih za pridobitev nepooblaščenega dostopa ali izvajanje drugih zlonamernih dejanj. Izkoriščanje je lahko v različnih oblikah, na primer z uporabo zlonamerne programske opreme, socialnega inženiringa ali hekerskih tehnik za pridobitev dostopa do sistemov, krajo informacij ali motenje poslovnih dejavnosti. Iz tega izhaja penetracijsko testiranje, kjer podjetja z namenom ugotovitve potencialnih ranljivosti najamejo profesionalne hekerje. V drugem delu magistrskega dela bomo predstavili rezultate naših poizkusov vdora in izkoriščanja ranljivosti v predpripravljene sisteme. Iz praktičnega dela bomo izhajali in prišli do zaključkov in smiselnih napotkov za zagotovitev boljše kibernetske varnosti.
Keywords:
informacijska varnost
,
kibernetska varnost
,
računalniške ranljivosti
,
hekerji
,
socialni inženiring
,
penetracijski test
Place of publishing:
Maribor
Publisher:
G. Šilak
Year of publishing:
2023
PID:
20.500.12556/DKUM-84169
UDC:
004.056.53
COBISS.SI-ID:
161719043
Publication date in DKUM:
21.08.2023
Views:
813
Downloads:
304
Metadata:
Categories:
EPF
Cite this work
Plain text
BibTeX
EndNote XML
EndNote/Refer
RIS
ABNT
ACM Ref
AMA
APA
Chicago 17th Author-Date
Harvard
IEEE
ISO 690
MLA
Vancouver
:
ŠILAK, Gaja, 2023,
Kibernetska varnost
[online]. Master’s thesis. Maribor : G. Šilak. [Accessed 29 April 2025]. Retrieved from: https://dk.um.si/IzpisGradiva.php?lang=eng&id=84169
Copy citation
Average score:
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
(0 votes)
Your score:
Voting is allowed only for
logged in
users.
Share:
Similar works from our repository:
Perioperative preparation of a patient with covid-19 infection
NURSES' AWARENESS OF THE CORRECT HANDLING OF MEDICAL TEXTILES
Preučevanje in ocenjevanje zahtev delovnih mest, kjer je potrebna specifična osebna varovalna oprema
THE IMPORTANCE OF SAFETY AND HEALTH AT WORK FOR EMPLOYEES IN CONSTRUCTION AND ROOFING COMPANIES
Occupational safety as a base of work injuries prevention
Similar works from other repositories:
Incombustible materials for protection against fire
Workplace safety in smaller concrete plant
COVID-19 pandemic and personal protective equipment in healthcare
Decontamination in a chemical incident
Personal protective equipment and information technology (I.T)
Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.
Licences
License:
CC BY-NC-ND 4.0, Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Link:
http://creativecommons.org/licenses/by-nc-nd/4.0/
Description:
The most restrictive Creative Commons license. This only allows people to download and share the work for no commercial gain and for no other purposes.
Licensing start date:
23.04.2023
Secondary language
Language:
English
Title:
Cyber security
Abstract:
In this Master's thesis we will define the concept of cyber security, and we will also look at the types and perpetrators of cyber attacks. We will present penetration testing, which is increasingly being used by companies in the market to identify vulnerabilities in their systems and improve security within the company. IT security is the protection of computer systems, networks and data from unauthorised access, theft, damage or other types of security breaches. It ensures the confidentiality, integrity and availability of information and resources and prevents unauthorised users from gaining access to sensitive information or systems. The aim of cyber security is to reduce the chances of attacks on computer systems and networks and to limit the damage that can be caused by the successful exploitation of vulnerabilities. Exploitation refers to the use of vulnerabilities or weaknesses in computer systems or networks to gain unauthorised access or perform other malicious acts. Exploitation can take many forms, such as the use of malware, social engineering or hacking techniques to gain access to systems, steal information or disrupt business activities. This leads to penetration testing, where companies hire professional hackers to identify potential vulnerabilities. In the second part of the master thesis, we will present the results of our attempts to penetrate and exploit vulnerabilities in pre-built systems. From the practical work we will draw conclusions and come up with meaningful guidance to ensure better cyber security.
Keywords:
information security
,
cyber security
,
computer vulnerabilities
,
hackers
,
social engineering
,
penetration testing
Comments
Leave comment
You must
log in
to leave a comment.
Comments (0)
0 - 0 / 0
There are no comments!
Back