| Name: | Description: | Size: | Format: | |
|---|---|---|---|---|
| 6.63 MB | Adobe PDF |
Advisor(s)
Abstract(s)
Devido ao facto de hoje em dia a informação que é processada numa rede informática
empresarial, ser cada vez mais de ordem confidencial, torna-se necessário que essa
informação esteja o mais protegida possível. Ao mesmo tempo, é necessário que esta
a informação esteja disponível com a devida rapidez, para os parceiros certos, num
mundo cada vez mais globalizado.
Com este trabalho pretende-se efectuar o estudo e implementação da segurança, numa
pequena e genérica rede de testes, que facilmente seja extrapolada, para uma rede da
dimensão, de uma grande empresa com potenciais ramificações por diversos locais.
Pretende-se implementar/monitorização segurança quer externamente, (Internet
service provider ISP) quer internamente (activos de rede, postos de
trabalho/utilizadores). Esta análise é baseada na localização (local, wireless ou
remota), e, sempre que seja detectada qualquer anomalia, seja identificada a sua
localização, sendo tomadas automaticamente acções de protecção.
Estas anomalias poderão ser geridas recorrendo a ferramentas open source ou
comerciais, que façam a recolha de toda a informação necessária, e tomem acções de
correcção ou alerta mediante o tipo de anomalia.
By the fact of nowadays the information that is processed in an enterprise network, must be each time, more than confidential, it becomes necessary to protect this information. At the same time, it is necessary to provide this informatation to become available as soon as possible, for the certain partners, with the globalization of the world. With this work, it is intended to study and implement security guard, in a small generic network prototype. In this case, is easily to export to network with a dimension of a great company, with potential ramifications, in diverse places. It is intended to implement/monitoring external security, (Internet service to sevice provider ISP), or internal security (networking equipment, servers, hosts or users). This analizes is based in the localization (local, remote or wireless), and whenever any anomaly is detected, and it can identifyed quickly, being taken an automatically protection. These anomalies could be managed appealing to the commercial or open source tools, which make possible to get all the necessary information, and take the necessaries measures of alerting or correcting that type of anomaly.
By the fact of nowadays the information that is processed in an enterprise network, must be each time, more than confidential, it becomes necessary to protect this information. At the same time, it is necessary to provide this informatation to become available as soon as possible, for the certain partners, with the globalization of the world. With this work, it is intended to study and implement security guard, in a small generic network prototype. In this case, is easily to export to network with a dimension of a great company, with potential ramifications, in diverse places. It is intended to implement/monitoring external security, (Internet service to sevice provider ISP), or internal security (networking equipment, servers, hosts or users). This analizes is based in the localization (local, remote or wireless), and whenever any anomaly is detected, and it can identifyed quickly, being taken an automatically protection. These anomalies could be managed appealing to the commercial or open source tools, which make possible to get all the necessary information, and take the necessaries measures of alerting or correcting that type of anomaly.
Description
Keywords
Redes informáticas Intrusão
Pedagogical Context
Citation
Publisher
Instituto Politécnico do Porto. Instituto Superior de Engenharia do Porto
