izpis_h1_title_alt

Preverjanje varnosti informacijsko komunikacijskih sistemov in izdelava testnega okolja
ID DURA, MARCO (Author), ID Umek, Anton (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (2,83 MB)
MD5: 704DB362539E29908BAE7D2AA54E70B2
PID: 20.500.12556/rul/d394eb0a-31ea-4cd4-95d3-d7e168b5c56a

Abstract
Sprva se je svetovni splet uporabljal za izmenjavo informacij na daljavo, sedaj pa je postal glavni vir komunikacije med posamezniki, podjetji in vladami. Za preverjanje varnosti informacijsko komunikacijskih sistemov se uporablja postopek penetracijskega testiranja. Bistvo diplomske naloge je prikazati področje varnostnega testiranja informacijskih sistemov in bralca spoznati z izdelavo testnega okolja. Na začetku diplomskega dela so predstavljeni osnovni pojmi varnostnega testiranja informacijskih sistemov ter kdo in zakaj se ukvarja s tem področjem. V tretjem poglavju je predstavljen standard penetracijskega testiranja, The Penetration Testing Execution Standard, ki deluje kot smernica za varnostne strokovnjake in poda strukturiran pregled nad izvajanjem testiranja ali varnostnega pregleda. Pri predstavitvi standarda so opisane posamezne faze izvajanja, z obrazloženimi pojmi, in podanimi praktičnimi primeri. V četrtem poglavju je predstavljeno virtualno okolje Capture the Flag, katerega namen je učenje in testiranje izrabljanja znanih ranljivosti v sistemih. Predstavljeni sta izdelava in oblikovanje testnega okolja, z dodajanjem znanih ranljivosti v sisteme. Na koncu dela je prikazano reševanje primerov v izdelanem okolju in pridobivanje nastavljenih zastavic. Dodani so tudi primeri možnih izboljšav izdelanega okolja.

Language:Slovenian
Keywords:Capture the Flag, informacijska varnost, informacijsko komunikacijski sistemi, izkoriščanje ranljivosti, omrežje, penetracijsko testiranje, ranljivost, standard izvajanja penetracijskega testiranja, testno virtualno okolje
Work type:Bachelor thesis/paper
Organization:FE - Faculty of Electrical Engineering
Year:2017
PID:20.500.12556/RUL-92970 This link opens in a new window
Publication date in RUL:11.07.2017
Views:1222
Downloads:790
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Verifying the security of ICT systems and creating the testing environment
Abstract:
Initially, the World Wide Web was used to exchange information at a distance, but has now become the main source of communication between individuals, businesses and governments. In order to check the security of information and communication systems, the penetration testing procedure is used. The aim of this thesis is to introduce the reader with penetration testing of information systems and to present the creation process of a virtual test environment. The environment was created as a game with educational purposes. At the beginning of this thesis, basic penetration testing concepts are presented. In the third chapter, phases of The Penetration Testing Execution Standard are described, which give a structured overview over the process of penetration testing. The presentation of the standard describes the individual execution phases with added practical examples. In the fourth chapter of this thesis, the concept Capture the Flag is explained. For the practical part of the thesis I created a custom virtual environment. The created virtual environment was created for security enthusiasts to learn new exploitation options. At the end of the thesis, solutions of previously given tasks are shown, which lead to flag retrieval. In addition, a few upgrades of the environment are listed.

Keywords:Capture the Flag, information security, information and communication systems, vulnerability exploitation, networking, penetration testing, vulnerability, The Penetration Testing Execution Standard, virtual testing environment

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back