Ładowanie...

Corporate IT security

dc.contributor.advisorMoczurad, Włodzimierz
dc.contributor.authorRydziński Patryk
dc.date.accessioned2017-06-30T13:09:15Z
dc.date.available2017-06-30T13:09:15Z
dc.date.issued2006pl
dc.description.abstractSecurity is crucial issue in the case of company that distributes its business activities to different locations. This is mostly driven by the amount and value of data that needs to be shared in order to cooperate and coordinate the business activities. It is not that hard to imagine how dangerous it can be for a company and its environment to compromise a system holding important data or processes. The consequences might be severe, ranging from devastation of personal life or loss of money, assets and reputation or human life. Summing up, although globalization and relocation of resources brought huge amounts of benefits, the new model of business created many security threats too. Those threats can result in serious damage to an organization’s wellbeing and existence. In addition, organization compromise often influences not only the organization involved, but also its environment. Purpose of this document is to identify the most effective technologies, their weak and strong points as well as successful implementation methods. Document will also contain analysis of interactions of particular solutions as that seems to play an important role in system security. Having done all that I will try to determine if it is possible to create secure, complete, functional and economically acceptable system.pl
dc.identifier.urihttp://hdl.handle.net/11199/10033
dc.language.isoenpl
dc.rightslicencja niewyłącznapl
dc.subjectinformation risk managementpl
dc.subjectfirewallpl
dc.subjectVirtual Private Networkspl
dc.subjecthoneypotspl
dc.subjectIntrusion Detection Systemspl
dc.subjectPenetration Testspl
dc.titleCorporate IT securitypl
dc.title.alternativeBezpieczeństwo systemów informatycznych w przedsiębiorstwachpl
dc.typemasterThesispl

Pliki