Title | Implementacija sigurne mrežne arhitekture |
Title (english) | Implementation of secure network architecture |
Author | Željka Rupić |
Mentor | Zvonimir Klarin (mentor) |
Committee member | Ivan Livaja (predsjednik povjerenstva) |
Committee member | Marko Pavelić (član povjerenstva) |
Committee member | Zvonimir Klarin (član povjerenstva) |
Granter | Šibenik University of Applied Sciences (Management) Šibenik |
Defense date and country | 2024-09-18, Croatia |
Scientific / art field, discipline and subdiscipline | SOCIAL SCIENCES Information and Communication Sciences Information Systems and Information Science |
Abstract | U radu su obrađeni temeljni koncepti računalnog umrežavanja, uključujući topologije, infrastrukturu, mrežne uređaje te sigurnosne politike i rješenja ključna za zaštitu podataka. Pravilnim odabirom mrežnih topologija, uređaja kao što su usmjernici, preklopnici i vatrozidi te pravilnim adresiranjem osigurava se učinkovitost upravljanja mrežnim prometom i kontrola pristupa osjetljivim podacima, što doprinosi stabilnosti i sigurnosti mrežne infrastrukture. Nadalje, rad se fokusira na sigurnosne protokole koji omogućuju enkripciju, autentikaciju i udaljeni pristup kako u žičnim tako i u bežičnim mrežama. Dizajn mreže uključuje i fizičke i logičke elemente koji omogućuju segmentaciju i definiranje sigurnosnih zona, temeljeno na načelima povjerljivosti, integriteta i dostupnosti (CIA trijada) kako bi se postigla optimalna zaštita mrežnog sustava. Praktični dio rada uključuje implementaciju i testiranje Snort alata kao sustava za otkrivanje i sprječavanje napada (engl. Intrusion Detection and Prevention System, IDS/IPS) u simuliranom okruženju. Rezultati testiranja pokazuju učinkovitost Snort alata u detekciji potencijalnih napada i pružaju smjernice za daljnje unaprjeđenje mrežne sigurnosti. |
Abstract (english) | The paper discusses the fundamental concepts of computer networking, including topologies, infrastructure, network devices, as well as security policies and solutions crucial for data protection. The proper selection of network topologies, devices such as routers, switches, and firewalls, and appropriate addressing ensures efficient network traffic management and access control to sensitive data, which contributes to the stability and security of network infrastructure. Furthermore, the paper focuses on security protocols that enable encryption, authentication, and remote access for both wired and wireless networks. Network design includes both physical and logical elements that enable segmentation and the definition of security zones, based on the principles of confidentiality, integrity, and availability (CIA triad), to achieve optimal protection of the network system. The practical part of the paper involves the implementation and testing of the Snort tool as an Intrusion Detection and Prevention System (IDS/IPS) in a simulated environment. The test results demonstrate the effectiveness of the Snort tool in detecting potential intrusions and provide guidelines for further improvement of network security. |
Keywords |
|
Keywords (english) |
|
Language | croatian |
URN:NBN | urn:nbn:hr:143:151184 |
Study programme | Title: Professional undergraduate study of Bussines Informatics Study programme type: professional Study level: undergraduate Academic / professional title: stručni/a prvostupnik/prvostupnica (baccalaureus/baccalaurea) poslovne informatike (stručni/a prvostupnik/prvostupnica (baccalaureus/baccalaurea) poslovne informatike) |
Type of resource | Text |
File origin | Born digital |
Access conditions | Open access |
Terms of use | |
Created on | 2024-09-19 08:53:42 |