Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: http://elartu.tntu.edu.ua/handle/lib/42137
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.advisorГолотенко, Олександр Сергійович-
dc.contributor.authorOlajuwon, Bankole Emmanuel-
dc.contributor.authorОладжувон, Банколе Еммануел-
dc.date.accessioned2023-07-18T09:55:23Z-
dc.date.available2023-07-18T09:55:23Z-
dc.date.issued2023-07-11-
dc.date.submitted2023-06-27-
dc.identifier.citationБанколе О.Е. Розробка системи захисту інформації в локальній комп'ютерній мережі підприємства : кваліфікаційна робота бакалавра за спеціальністю 122 «Комп’ютерні науки» / О.Е. Банколе – Тернопіль : ТНТУ, 2023. – 50 с.uk_UA
dc.identifier.urihttp://elartu.tntu.edu.ua/handle/lib/42137-
dc.description.abstractIn this diploma thesis developed a "Smart Office" project based on the Internet of things (IoT) technologies. Basic documentation has been prepared: subsystem operation algorithm, the basic electrical scheme, functional scheme, сcomparison of data providers. A programming language and appropriate development tools have been chosen, the structural elements of the subsystem and its web interface in configuration mode have been developed. The created subsystem fully satisfies the requirements and successfully accomplishes all assigned tasks.uk_UA
dc.description.tableofcontentsINTRODUCTION 6 1 ANALYSIS THE METHODS OF INFORMATION PROTECTION IN LOCAL AREA NETWORKS 8 1.1 Threats and dangers in a Local Area Network 8 1.1.1 Unauthorized Access and Information Leakage: 8 1.1.2 Destructive Software Tools. 11 1.2 Methods and Means of Information Protection: 14 1.2.1 Methods and Approaches to Information Protection 14 1.3 Basic Security Services 16 1.3.1 User Identification and Authentication 16 1.3.2 Access control 21 1.3.3 Logging and auditing 21 1.3.4 Cryptography 22 1.3.5 Screening 23 2 PROTECTION OF INFORMATION IN LLC "OILGROUP" 25 2.1 Composition of information exposed to threats 25 2.2 The enterprise network and software 26 2.3 Analysis of the vulnerability of the enterprise 27 2.3.1 Possible ways of implementing threats in OILGROUP 27 2.3.2 Assessment of the relevance of infrastructure threats 28 2.4 Protection Solution Recommendations 30 2.4.1 Firewall Installation 30 2.4.2 Installing a crypto provider in the data protection system 32 2.4.3 Installation of intrusion detection and antivirus 37 3 OCCUPATIONAL SAFETY AND HEALTH 41 3.1. General characteristics of the room and workplace 41 3.2 Analysis of potentially dangerous and harmful production factors in the workplace 44 Conclusions 47 REFERENCES 49uk_UA
dc.language.isoenuk_UA
dc.subjectethernetuk_UA
dc.subjectphysical topologyuk_UA
dc.subjectnetwork equipmentuk_UA
dc.subjectswitchinguk_UA
dc.subjectroutinguk_UA
dc.subjectsharing servicesuk_UA
dc.subjectsystemuk_UA
dc.subjectIoTuk_UA
dc.subjectsmart technologiesuk_UA
dc.titleDevelopment of an information security system in the the enterprise local computer networkuk_UA
dc.title.alternativeРозробка системи захисту інформації в локальній комп'ютерній мережі підприємстваuk_UA
dc.typeBachelor Thesisuk_UA
dc.rights.holder© Банколе Оладжувон Еммануел, 2023uk_UA
dc.contributor.committeeMemberСтадник, Наталія Богданівна-
dc.coverage.placenameТНТУ ім. І.Пулюя, ФІС, м. Тернопіль, Українаuk_UA
dc.subject.udc004.7uk_UA
dc.relation.references1. Asghar M., Mohammadzadeh N., «Design and simulation of energy efficiency in node based on MQTT protocol in Internet of Things» // International Conference on Green Computing and Internet of Things. – 2015. – С. 1413-1417.uk_UA
dc.relation.references2. Bass A., Bauer M., Fiedler M., Kramp T., van Kranenburg R., Lange S., Meissner S. Enabling Things to Talk. Springer-Verlag GmbH, 2013. – P. 325.uk_UA
dc.relation.references3. Gubbi J., Marusicet S., Buyya R., Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems. – 2013. – №. 7. – С. 1645–1660. [сайт]. - URL: 10.1016/j.future.2013.01.010.uk_UA
dc.relation.references4. Heather Flanagan, “Digital Preservation Considerations for the RFC Series,” January 2015, Internet Draft, work in progress, draft-flanagan-rfc-preservation-03.uk_UA
dc.relation.references5. Internet of Things Global Standards Initiative: [WEB]. – URL: http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspxuk_UA
dc.relation.references6. Internet of Things Global Standards Initiative: [WEB]. – URL: http://www.itu.int/en/ITU-T/gsi/iot/ Pages/default.aspxuk_UA
dc.relation.references7. Kang D., Park M. Lin S.W., Martin R.A., Miller B.W., Durand J. et al. Industrial internet reference architecture technical report. IIC, 2015uk_UA
dc.relation.references8. Lobaccaro G, Carlucci S, Lofstrom E. A review of systems and technologies for smart homes and smart grids. Energies, 2016. – 348 с.uk_UA
dc.relation.references9. Shih C., Chou J., Designing CPS/IoT applications for smart buildings and cities / C. Shih, J. Chou // IET Cyber-Physical Systems: Theory & Applications. – 2016. – № 1. – С. 3-12.uk_UA
dc.relation.references10. Wortmann F., Flüchter K. Internet of things. Business & Inform. Syst. Eng, 2015. – № 3. – p. 221–224uk_UA
dc.relation.references11. Xia F., Yang L.T., Wang L., Vinel A. Internet of things. Int. J. of Commun. Syst. – 2012. – Vol. 25. – № 9. – p. 1101–1109uk_UA
dc.relation.references12. Yih-Fang Huang; Werner, S.; Jing Huang; Kashyap, N.; Gupta, V., "State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid," Signal Processing Magazine, IEEE , vol.29, no.5, pp.33,43, Sept. 2012uk_UA
dc.relation.references13. Tomoiagă, B.; Chindriş, M.; Sumper, A.; Sudria-Andreu, A.; Villafafila-Robles, R. Pareto. Optimal Reconfiguration of Power Distribution Systems Using a Genetic Algorithm Based on NSGA-II. Energies 2013, 6, 1439-1455uk_UA
dc.relation.references14. F.R. Yu, P. Zhang, W. Xiao, and P. Choudhury, "Communication Systems for Grid Integration of Renewable Energy Resources," IEEE Network, vol. 25, no. 5, pp. 22-29, Sept. 2011uk_UA
dc.relation.references15. “Values and Principles”. Principles. Internet Society, 2015. http://www.internetsociety.org/who-we-are/mission/values-and-principlesuk_UA
dc.contributor.affiliationТНТУ ім. І. Пулюя, Факультет комп’ютерно-інформаційних систем і програмної інженерії, Кафедра комп’ютерних наук, м. Тернопіль, Українаuk_UA
dc.coverage.countryUAuk_UA
Розташовується у зібраннях:122 — Компʼютерні науки (бакалаври)

Файли цього матеріалу:
Файл Опис РозмірФормат 
Lil_Banky_thesis.pdf716,45 kBAdobe PDFПереглянути/відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.

Інструменти адміністратора