izpis_h1_title_alt

Preverjanje varnosti informacijsko komunikacijskih sistemov in izdelava testnega okolja
DURA, MARCO (Author), Umek, Anton (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (2,83 MB)

Abstract
Sprva se je svetovni splet uporabljal za izmenjavo informacij na daljavo, sedaj pa je postal glavni vir komunikacije med posamezniki, podjetji in vladami. Za preverjanje varnosti informacijsko komunikacijskih sistemov se uporablja postopek penetracijskega testiranja. Bistvo diplomske naloge je prikazati področje varnostnega testiranja informacijskih sistemov in bralca spoznati z izdelavo testnega okolja. Na začetku diplomskega dela so predstavljeni osnovni pojmi varnostnega testiranja informacijskih sistemov ter kdo in zakaj se ukvarja s tem področjem. V tretjem poglavju je predstavljen standard penetracijskega testiranja, The Penetration Testing Execution Standard, ki deluje kot smernica za varnostne strokovnjake in poda strukturiran pregled nad izvajanjem testiranja ali varnostnega pregleda. Pri predstavitvi standarda so opisane posamezne faze izvajanja, z obrazloženimi pojmi, in podanimi praktičnimi primeri. V četrtem poglavju je predstavljeno virtualno okolje Capture the Flag, katerega namen je učenje in testiranje izrabljanja znanih ranljivosti v sistemih. Predstavljeni sta izdelava in oblikovanje testnega okolja, z dodajanjem znanih ranljivosti v sisteme. Na koncu dela je prikazano reševanje primerov v izdelanem okolju in pridobivanje nastavljenih zastavic. Dodani so tudi primeri možnih izboljšav izdelanega okolja.

Language:Slovenian
Keywords:Capture the Flag, informacijska varnost, informacijsko komunikacijski sistemi, izkoriščanje ranljivosti, omrežje, penetracijsko testiranje, ranljivost, standard izvajanja penetracijskega testiranja, testno virtualno okolje
Work type:Bachelor thesis/paper (mb11)
Organization:FE - Faculty of Electrical Engineering
Year:2017
Views:609
Downloads:661
Metadata:XML RDF-CHPDL DC-XML DC-RDF
 
Average score:(0 votes)
Your score:Voting is allowed only to logged in users.
:
Share:AddThis
AddThis uses cookies that require your consent. Edit consent...

Secondary language

Language:English
Title:Verifying the security of ICT systems and creating the testing environment
Abstract:
Initially, the World Wide Web was used to exchange information at a distance, but has now become the main source of communication between individuals, businesses and governments. In order to check the security of information and communication systems, the penetration testing procedure is used. The aim of this thesis is to introduce the reader with penetration testing of information systems and to present the creation process of a virtual test environment. The environment was created as a game with educational purposes. At the beginning of this thesis, basic penetration testing concepts are presented. In the third chapter, phases of The Penetration Testing Execution Standard are described, which give a structured overview over the process of penetration testing. The presentation of the standard describes the individual execution phases with added practical examples. In the fourth chapter of this thesis, the concept Capture the Flag is explained. For the practical part of the thesis I created a custom virtual environment. The created virtual environment was created for security enthusiasts to learn new exploitation options. At the end of the thesis, solutions of previously given tasks are shown, which lead to flag retrieval. In addition, a few upgrades of the environment are listed.

Keywords:Capture the Flag, information security, information and communication systems, vulnerability exploitation, networking, penetration testing, vulnerability, The Penetration Testing Execution Standard, virtual testing environment

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Comments

Leave comment

You have to log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back