Volume 6 number 21, pages: 45 - 57

Published: Jan 27, 2020

CODEX MORALS AFTER CARELESSLY INVOLVEMENT AT THE INTERNET WORLD'

Aleksic-Maric Vesna 1
Aleksic-Maric Vesna
Affiliations
  University of Banja Luka, Faculty of Economics, Bosnia and Herzegovina
Stojanovic Dusanka 2
Stojanovic Dusanka
Affiliations
  University of Banja Luka , Faculty of Technology, Bosnia and Herzegovina
Open PDF

Abstract

Modern organisations are faced with a numerous security threats. Today, there are different recommendations and standards that offer guidelines for protecting organization's information security. This paper describes the implementation of information security management system according to ISO/IEC 17799 and ISO/IEC 27001 standards. In this paper different methods of attacks, threats and different forms of dangers to the computer networks are described. The possible models and technical solutions for networks protection are also given. The effects of threats directed to the computer networks and their information are analyzed certain technical solutions that provide necessary protection level of the computer networks as well as measures for information protection are also described. The standards for methods and security procedure for the information in computer networks are enlisted. There is also an example of protecting one local data network (in this paper).

Keywords

authenticity computer networks countermeasures endanger of networks information confidentiality integrity network threats protection demands

References

1.(2005) u: Computer Security Incident Handling (1), Annual Conference, Singapore

2. (2005) u: Privacy Enhancing Technologies (5th), Workshop, Dubrovnik, 30. svibnja - 1. lipnja

3. How to kerberize your site. http://www.epm.ornl.gov/~jar/HowToKerb.html

4. (2005) u: InfoSeCon: Information Security Conference, Dubrovnik, Cavtat, 6-9. lipnja

5. Blackburn, P. (2000) AFS distributed file system FAQ - verzija 1.113. 26. siječnja, http://www.angelfire.com/hi/plutonic/afs-faq.html

6. Ediger, B. (1999) 10 reasons why OSF DCE sucks. http//www.cnn.net/~bediger/anti_dce.html

7. Itoi, N., Honeyman, P. (1998) Pluggable authentication modules for windows NT. 4. kolovoza, http://www.personal.engin.umich.edu/~itoi/ni_pam_usenix.pdf, Konferencije

8. Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H. (1988) Kerberos authentication and authorization system: Project Athena technical plan, section E.2.1. 27. listopada, ftp://athena.dist.mit.edu/pub/kerberos/doc/techplan.ps

9. Neuman, B.C., Ts'o, T. (1994) Kerberos: An authentication service for computer networks: USC/ISI technical report: Number ISI/RS-94-399. IEEE Communications Magazine, Volume 32, Number 9, pages 33-38, September, http://nii.isi.edu/publications/kerberos-neuman-tso.html

10. Steiner, J.G., Neuman, C., Schiller, J.I. (1988) Kerberos: An authentication service for open network systems. 30. ožujka ftp://athena.dist.mit.edu/pub/kerberos/doc/usenix.ps

11. Vandenwauver, M., Govaerts, R., Vandewalle, J. (1997) Security of client-server systems information security: From small systems to management of secure infrastructures. IFIP Press, May, str. 39-54, http://www.esat.kuleuven.ac.be/cosic/sesame/papers/wg11.2-7/index.html