Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://elartu.tntu.edu.ua/handle/lib/38460
Full metadata record
DC poleHodnotaJazyk
dc.contributor.advisorЗолотий, Роман Захарійович-
dc.contributor.authorNjikonye, Godswill Nwakanma-
dc.date.accessioned2022-07-11T14:48:27Z-
dc.date.available2022-07-11T14:48:27Z-
dc.date.issued2022-07-06-
dc.date.submitted2022-06-22-
dc.identifier.citationNjikonye Godswill Nwakanma. Інформаційна система управління подіями кібербезпеки для створення правил Firewall : кваліфікаційна робота освітнього рівня „Бакалавр“ за спеціальністю „122 — комп’ютерні науки“ /Njikonye Godswill Nwakanma. — Тернопіль : ТНТУ, 2022. — 57 с.uk_UA
dc.identifier.urihttp://elartu.tntu.edu.ua/handle/lib/38460-
dc.description.abstractIn order to reach the goal, in the thesis work, a detailed information about the actuality of the development of the software module of the cybersecurity control system was reviewed, a selection of software and technical aids for the creation of the module was primed, and a test was carried out with virtual information systems. The thesis presents a software module for automating the creation of rules for Firewall according to IDS indicators and rules defined by the security administrator. Keywords: IDS systems, cyber security, firewall, information systems, APT attacks, software module. The purpose of the thesis is to develop a program module for managing cybersecurity events. In order to achieve the goal in the thesis, the general questions about the urgency of the development of the software module for the management of the events of cybersecurity are considered, the choice of software and technical means for the creation of the module is substantiated, as well as its testing in the virtual information system has been conducted. In the thesis is presented a program automation module for creating rules for Firewall according to IDS indicators and rules defined by the security administrator.uk_UA
dc.description.tableofcontentsINTRODUCTION 7 1 STATEMENT OF THE PROBLEM AND RELEVANCE 9 1.1 BASIC TERMS 9 1.2THE IMPORTANCE OF INFORMATION SYSTEMS 11 1.3 TYPES OF NETWORK ATTACKS ON INFORMATION SYSTEMS 12 1.4 THE PROBLEM OF INFORMATION SECURITY IN INFORMATION SYSTEMS 14 2 AUTOMATION OF THE PROCESS OF FORMATION OF MANAGEMENT DATA OF THE BORDER INTERNET SCREEN 30 2.1 DEVELOPMENT OF PROPOSALS FOR AUTOMATING THE PROCESS OF GENERATING IPS MANAGEMENT DATA BASED ON IDS SURICATA CYBER SECURITY EVENT INDICATORS 30 2.2 CONFIGURING IDS SURICATA AND WRITING YOUR OWN RULES 31 2.3 DEVELOPMENT AND TESTING OF THE IPS MANAGEMENT DATA FORMATION SOFTWARE MODULE 34 3 LIFE SAFETY, BASICS OF LABOR PROTECTION 45 3.1 BASICS OF LABOR PROTECTION 45 3.1.1 CHARACTERISTICS OF THE ORGANIZATION OF PRODUCTION, TECHNOLOGY IN TERMS OF LABOR PROTECTION 45 3.1.2 LEGISLATION ON LABOR PROTECTION IN THE FIELD OF INFORMATION TECHNOLOGY 48 3.2 LIFE SAFETY 50 3.2.1 ANALYSIS OF HARMFUL AND DANGEROUS FACTORS 50 3.2.2 ENGINEERING SOLUTION 52 3.2.3 ELECTRICAL SAFETY 53 3.2.4 FIRE SAFETY 54 CONCLUSION 56 REFERENCES 57uk_UA
dc.language.isoenuk_UA
dc.subjectінформаційна системаuk_UA
dc.subjectinformation systemuk_UA
dc.subjectкібербепекаuk_UA
dc.subjectwebsiteuk_UA
dc.subjectфаєрволлuk_UA
dc.subjectfirewalluk_UA
dc.subjectрозробкаuk_UA
dc.subjectdevelopmentuk_UA
dc.subjectпрограмний модульuk_UA
dc.subjectsoftware moduleuk_UA
dc.titleІнформаційна система управління подіями кібербезпеки для створення правил Firewalluk_UA
dc.title.alternativeCybersecurity event management information system for creating firewall rulesuk_UA
dc.typeBachelor Thesisuk_UA
dc.rights.holder© Njikonye Godswill Nwakanma, 2022uk_UA
dc.contributor.committeeMemberСтадник, Наталя Богданівна-
dc.coverage.placenameТНТУ ім. І.Пулюя, ФІС, м. Тернопіль, Українаuk_UA
dc.subject.udc004.7uk_UA
dc.relation.references1. Information systems and technologies in management / http://pidruchniki.com/74225/informatika/avtomatizovani_sistemi_upravlinnya_obroblennya_analizu_informatsiyi. 2. Analysis of modern intrusion detection systems / O.V. Severinov, A.G. Hryenov, 2016. 16 p. 3. Protected operating systems / Lviv Polytechnic National University, BICS department Lecture 3, 2016. 4. UFW / http://integrator.adior.ru/index.php/linux–command/364–ufw–firewall–linux–pomogayushchij–upravlyat–iptables. 5. Comparison of programming languages / http://lib.mdpu.org.ua/e–book/vstup/L4.html 6. Network equipment - devices that make up a computer network / http://ittexnoall.com/index.php/osnovy–kompyutera/1002–merezheve–obladnannya–pristroji–z–yakikh–skladaetsya–komp–yuterna–merezha.html 7. Characteristics of programming languages / Essay "Possibilities and Purpose of the Language for Creating Server Scripts" Ph.D. S.V. Lenkov, 2015 3–4 p.uk_UA
dc.contributor.affiliationТНТУ ім. І. Пулюя, Факультет комп’ютерно-інформаційних систем і програмної інженерії, Кафедра комп’ютерних наук, м. Тернопіль, Українаuk_UA
dc.coverage.countryUAuk_UA
Vyskytuje se v kolekcích:122 — Компʼютерні науки (бакалаври)

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
Main_Part_Njikonye_.pdf1,24 MBAdobe PDFZobrazit/otevřít


Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.

Nástroje administrátora