Istrazivanja i projektovanja za privreduJournal of Applied Engineering Science

CODEX MORALS AFTER CARELESSLY INVOLVEMENT AT THE INTERNET WORLD'


ISSN: 1451-4117

E-ISSN: 1821-31977
Volume 6 number 21, pages: 45 - 57

Aleksic-Maric Vesna 
University of Banja Luka, Faculty of Economics, Bosnia and Herzegovina

Stojanovic Dusanka 
University of Banja Luka , Faculty of Technology, Bosnia and Herzegovina

Modern organisations are faced with a numerous security threats. Today, there are different recommendations and standards that offer guidelines for protecting organization's information security. This paper describes the implementation of information security management system according to ISO/IEC 17799 and ISO/IEC 27001 standards. In this paper different methods of attacks, threats and different forms of dangers to the computer networks are described. The possible models and technical solutions for networks protection are also given. The effects of threats directed to the computer networks and their information are analyzed certain technical solutions that provide necessary protection level of the computer networks as well as measures for information protection are also described. The standards for methods and security procedure for the information in computer networks are enlisted. There is also an example of protecting one local data network (in this paper).

View article

1.(2005) u: Computer Security Incident Handling (1), Annual Conference, Singapore

2. (2005) u: Privacy Enhancing Technologies (5th), Workshop, Dubrovnik, 30. svibnja - 1. lipnja

3. How to kerberize your site. http://www.epm.ornl.gov/~jar/HowToKerb.html

4. (2005) u: InfoSeCon: Information Security Conference, Dubrovnik, Cavtat, 6-9. lipnja

5. Blackburn, P. (2000) AFS distributed file system FAQ - verzija 1.113. 26. siječnja, http://www.angelfire.com/hi/plutonic/afs-faq.html

6. Ediger, B. (1999) 10 reasons why OSF DCE sucks. http//www.cnn.net/~bediger/anti_dce.html

7. Itoi, N., Honeyman, P. (1998) Pluggable authentication modules for windows NT. 4. kolovoza, http://www.personal.engin.umich.edu/~itoi/ni_pam_usenix.pdf, Konferencije

8. Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H. (1988) Kerberos authentication and authorization system: Project Athena technical plan, section E.2.1. 27. listopada, ftp://athena.dist.mit.edu/pub/kerberos/doc/techplan.ps

9. Neuman, B.C., Ts'o, T. (1994) Kerberos: An authentication service for computer networks: USC/ISI technical report: Number ISI/RS-94-399. IEEE Communications Magazine, Volume 32, Number 9, pages 33-38, September, http://nii.isi.edu/publications/kerberos-neuman-tso.html

10. Steiner, J.G., Neuman, C., Schiller, J.I. (1988) Kerberos: An authentication service for open network systems. 30. ožujka ftp://athena.dist.mit.edu/pub/kerberos/doc/usenix.ps

11. Vandenwauver, M., Govaerts, R., Vandewalle, J. (1997) Security of client-server systems information security: From small systems to management of secure infrastructures. IFIP Press, May, str. 39-54, http://www.esat.kuleuven.ac.be/cosic/sesame/papers/wg11.2-7/index.html