diplomska naloga
Matic Kuhelj (Author), Marko Potokar (Mentor)

Abstract

Hitrost razvoja informacijske tehnologije je vedno hitrejša in posledično se tudi vedno več naprav povezuje v svetovni splet. Če se malo zamislimo, katere vse naprave se povezujejo v svetovni splet, kaj hitro pridemo do spoznanja, da se v svetovni splet povezujejo skoraj vse naprave. Vsaka naprava, ki se je sposobna povezati v splet, pa pomeni ranljivost oziroma morebitno nevarnost bodisi zaradi napake v delovanju oziroma programski kodi ali pa v napaki same konfiguracije. Zavedati pa se tudi moramo, da v podjetjih gledajo na IT-kader kot nekaj, kar jim povzroča strošek, in ne nekaj, kar je nujno potrebno za nemoteno delovanje podjetja. Zaposleni v IT-oddelkih so velikokrat preobremenjeni in vse, kar morajo narediti, naredijo na hitro. Prav tako v IT-oddelkih ne namenijo dovolj časa za razna izobraževanja, da bi se IT-kader naučil pravilno in varno konfigurirati naprave ter izvesti osnoven varnostni pregled.

Keywords

hekerji;kibernetska varnost;penetracijsko testiranje;konfiguracija;varnostni pregledi;

Data

Language: Slovenian
Year of publishing:
Typology: 2.11 - Undergraduate Thesis
Organization: FIŠ - Faculty of Information Studies
Publisher: [M. Kuhelj]
UDC: 621.391:005.934(043.2)
COBISS: 33033731 Link will open in a new window
Views: 68
Downloads: 4
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary abstract: The development of information technology is increasingly faster and, as a consequence, more and more devices get connected to the world web. If we think about all the devices connected to the world web, we soon realise that it connects almost all devices. Every device that can be connected to the world web also presents vulnerability or a possible danger, either due to a defect in functioning, programming code or the configuration itself. Moreover, we have to take into account that companies perceive IT employees as an expense, not as an asset necessary for the company to function and conduct business smoothly. Since IT employees are often overburdened, they do everything they have to do too quickly. Furthermore, in the IT department, they do not devote enough attention to trainings, which would help them learn how to properly and safely configure devices. An improper configuration and other types of vulnerability give rise to the so-called hackers, who try to take control over devices.
Secondary keywords: hackers;cybersecurity;penetration testing;configuration;security check;
Type (COBISS): Bachelor thesis/paper
Thesis comment: Fakulteta za informacijske študije v Novem mestu
Source comment: Na ov.: Diplomska naloga : visokošolskega strokovnega študijskega programa prve stopnje;
Pages: XV, 79 str.
ID: 12054662