undergraduate thesis
INFORMATION SECURITY IN TCP/IP NETWORKS

Josip Berger (2016)
Virovitica College
Metadata
TitleSIGURNOST INFORMACIJA U TCP/IP MREŽAMA
AuthorJosip Berger
Mentor(s)Enes Ciriković (thesis advisor)
Abstract
Informacijski sustavi sastoje se od informacija i podataka koji čine jedan složeni sustav usmjeren ka ostvarivanju postavljenih ciljeva koji se mogu ostvariti samo ako upravljamo sustavom na odgovarajući način. Internet je svjetska mreža koja korištenjem internetskih protokola, omogućuje komunikaciju i pristup raznim uslugama. Prema transportnom protokolu TCP (Transmission Control Protocol) arhitektura Interneta naziva se TCP/IP arhitektura koju možemo opisati pomoću TCP/IP modela i sastoji se od 4 sloja:fizički, mrežni, transportni i aplikacijski sloj. Neki od izvora ugroženosti za TCP/IP mrežu su zlonamjerni programi u koje spadaju virusi, crvi, trojanski konji, spyware, adware, hoax imnogi drugi koji se mogu preuzeti skidanjem datoteka s Interneta, ilegalnih kopija softvera,mogu biti prisutni u elektroničkim porukama ili otvaranjem pop-up reklama. DoS i DDoSnapadi uskraćuju usluge korisnicima zatrpavanjem podacima računalo više nego što računalni sustav može podnijeti. Za zaštitu od takvih zlonamjernih programa i napada,potrebna je uspostava antivirusnih programa za identifikaciju i eliminaciju izvora opasnosti ili enkripcija podataka gdje se podaci šifriraju u nečitljivi oblik. IPSec protokol služi zazaštitu podataka u TCP/IP mreži tako da se omogući sigurna komunikacija i razmjena podataka između dva ili više računala na Internetu. Vatrozid određene pakete propušta u promet, dok druge podatke blokira ukoliko identificira određenu opasnost za naše računalo, a između vatrozida može se uspostaviti proxy server za što bržu i sigurniju razmjenu podataka. Honeypot i honeynet su računalni sustavi za mamljenje i postavljanje zamki napadačima.
KeywordsInternet TCP/IP network Internet protocols information system sources of risk malicious programs protection of data and computer system
Parallel title (English)INFORMATION SECURITY IN TCP/IP NETWORKS
GranterVirovitica College
PlaceVirovitica
StateCroatia
Scientific field, discipline, subdisciplineTECHNICAL SCIENCES
Computing
Study programme typeprofessional
Study levelundergraduate
Study programmeManagement; specializations in: Management in Computer Sciences, Management in Rural Tourism
Study specializationManagement in Computer Sciences
Academic title abbreviationbacc.oec.
Genreundergraduate thesis
Language Croatian
Defense date2016-12-06
Parallel abstract (English)
Information systems consist of information and data that make a complexsystem aimed to accomplish the objectives that can be achieved if we manage the systemproperly. Internet is a global network that by using Internet Protocol, enables communicationand access to various services. According to transport protocol TCP (Transmission ControlProtocol), Internet architecture is called TCP / IP architecture that can be described usingthe TCP / IP model and it consists of four layers: physical, network, transport and applicationlayer. Some of the sources of threat to the TCP / IP network are malicious programs whichinclude viruses, worms, Trojan horses, spyware, adware, hoaxes and many others that can bedownloaded by downloading files from the Internet and illegal copies various software. Theycan also be present in electronic messages or we can download them when we open pop-upadvertisements. DoS and DDoS attacks deny service to customers by filling computer withmore data than a computer system can handle. To protect from malware programmes andattacks, it is required to establish anti-virus software to identify and eliminate sources ofdanger, or encryption of data where data is encoded in unreadable form. IPSec protocol isused for protection of data in the TCP / IP network so that secure communication andexchange of data between two or more computers on the Internet can be enabled. Firewallomits certain packages in traffic and blocks other data if identifies some threat to ourcomputer, and a proxy server can be set up between a firewall for faster and more securedata exchange. Honeypot and honeynet are computer systems for enticeming and trappingattackers.
Parallel keywords (Croatian)Internet TCP/IP mreža Internet protokoli informacijski sustav izvoriopasnosti zlonamjerni programi zaštita podataka i računalnog sustava
Resource typetext
Access conditionAccess restricted to students and staff of home institution
Terms of usehttp://rightsstatements.org/vocab/InC/1.0/
URN:NBNhttps://urn.nsk.hr/urn:nbn:hr:165:518528
CommitterIvana Vidak