Development of two modules for the Ncrack Network Authenticator

RDF 

 
Το τεκμήριο παρέχεται από τον φορέα :

Αποθετήριο :
Αποθετήριο ΔΙ.ΠΑ.Ε.
δείτε την καρτέλα τεκμηρίου
μέσα από τον ιστότοπο του αποθετηρίου του φορέα *
κοινοποιήστε το τεκμήριο



Σημασιολογικός εμπλουτισμός/ομογενοποίηση από το EKT

2017 (EL)
Development of two modules for the Ncrack Network Authenticator (EN)

Ilias, Panagiotis (EN)

School of Science and Technology, MSc in Mobile and Web Computing (EL)
Papadopoulos, Apostolos (EN)
Gkatzianas, Marios (EN)
Karaliopoulos, Merkourios (EN)

Information security or cybersecurity is a field that becomes more and more popular. Information security or infosec, is several strategies we use in order to control and check the processes, tools as well as policies that are necessary to prevent, expose, document an d counter cyber threats to crucial information . Part of information security’s aim is to use a set of business procedures that will keep the information assets safe without having to do with the information’s presentation. Information security programs are developed with some core objectives in mind: maintaining the confidentiality , integrity and availability of Information Technology systems and business data. These objectives guarantee that important information can only be accessed to authorized parties (confidentiality), unauthorized change of data (integrity) and data can be accessed by authorized parties when they want to (availability). Major enterprises usually employ a dedicated security group to apply and support the organization's cybersecurity program. The security group is generally accountable for conducting risk management, a process in which vulnerabilities and other dangers to information assets are constantly assessed, and the corresponding protective measures are decided on and applied. The core of an organization resides within its information and so, its security is crucial for business operations, as well as the level of credibility required earning the trust of clients. The dangers to sensitive and private information have many different forms, such as malware and phishing attacks, identity theft and ransomware. In order to prevent attackers and reduce the number of vulnerabilities at multiple layers, a number security controls are applied and managed as part of a hardened defense in depth strategy. This can mitigate the impact of an attack. So, in cybersecurity in order to be able to monitor a security breach, security experts who are responsible for the corresponding system always have an incident response plan in place. This allows them to observe and limit the damage, remove the threat and add updated defense controls. Procedures and policies related to the field of information security mostly require physical and digital security actions in order to keep sensitive information intact from unauthorized access and use, modification or destruction. These measures can be mantraps, encryption key management, network intrusion detection systems, password policies or regulatory compliance. Security audit may be scheduled to evaluate the organization's ability to keep their information assets safe. (EN)

masterThesis

Διεθνές Πανεπιστήμιο της Ελλάδος (EL)
International Hellenic University (EN)

2017-05-01


IHU (EN)



*Η εύρυθμη και αδιάλειπτη λειτουργία των διαδικτυακών διευθύνσεων των συλλογών (ψηφιακό αρχείο, καρτέλα τεκμηρίου στο αποθετήριο) είναι αποκλειστική ευθύνη των αντίστοιχων Φορέων περιεχομένου.