izpis_h1_title_alt

Avtomatizacija beleženja ranljivosti organizacij: Nov pristop k preprečevanju napadov z uporabo javno dostopnih podatkov
ID Pungaršek Pritržnik, Samo (Author), ID Modic, David (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,80 MB)
MD5: 3DC5627C53C8C21D30115607CF2225AD

Abstract
V diplomski nalogi smo predstavili, kaj so javno dostopni podatki in kako se uporabljajo v različnih situacijah. Poudarek smo postavili na vlogo, ki jo predstavljajo javno dostopni podatki v področju varnosti ter kako lahko to vpliva na ranljivosti organizacij. Pri raziskovanju smo se osredotočili na orodji SpiderFoot in Maltego, ki sta nam pomagali identificirati človeške ranljivosti. Ta orodja smo aplicirali na izdelanem modulu, ki nas je obvestil o potencialnih grožnjah za podane organizacije. Analiza in uporaba teh orodij nam je omogočala boljše razumevanje in prepoznavo vzorcev zlorabe podatkov. Skozi praktične primere smo demonstrirali, kako je mogoče z analitičnim pristopom izboljšati varnostna pravila in zmanjšati tveganja, povezana z zlorabo podatkov v organizacijah

Language:Slovenian
Keywords:javno dostopni podatki, OSINT, socialni inženiring, kibernetska varnost
Work type:Bachelor thesis/paper
Organization:FRI - Faculty of Computer and Information Science
Year:2024
PID:20.500.12556/RUL-161490 This link opens in a new window
Publication date in RUL:11.09.2024
Views:99
Downloads:74
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Automating the Documentation of Organizational Vulnerabilities: A Novel Approach to Attack Prevention Leveraging Publicly Available Data
Abstract:
In this thesis, we presented what publicly available data is and how it is used in various situations. We focused on the role that publicly available data plays in the field of security and how it can impact organizational vulnerabilities. Our research is centered on the tools SpiderFoot and Maltego, which helped us identify human vulnerabilities. These tools were applied to a developed module that notified us of potential threats to the specified organizations. The analysis and use of these tools allowed us to better understand and recognize patterns of data misuse. Through practical examples, we demonstrated how an analytical approach can improve security policies and reduce risks associated with data misuse in organizations.

Keywords:open source intelligence, OSINT, social engineering, cyber security

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back