2 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 2 / 2
Yayın Ipcube personal firewall on linux(Işık Üniversitesi, 2004-06) Pamukçu, Örge Anıl; Koç, Çetin Kaya; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıThe aim of this project is to developing a personal firewall which will have functionalities in a regular firewall also will have the missing functions like configuring firewall from any platform and any location via internet or local network. There is no many user-friendly personal firewalls works on Linux operating system. In the beginning of this study differences and common properties of firewalls examined. IPCUBE is designed and developed to collect good features of firewalls on a personal firewall. It provides stable, secure open sourced, web- based, highly configurable and easy maintained Linux Firewall. IPCUBE is designed on Iptable future of Linux. It uses Iptable commands to check and manage network with packet filtering concept. Its web-based console provides easy and highly configurable options to the non-technic users. All of the TPCUBE's functionalities can be managed on this web-based console. The aim is to continue our improvements on IPWALL as gateway firewall and IPCUBE as personal firewall and share our knowledge of this project in open source community.Yayın Risk scalable and modular security architectures(Işık Üniversitesi, 2005-04) Kunter, Ünal; Koç, Çetin Kaya; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıNetwork security is ensuring the availability, the integrity and the confidentiality in the business activities. Network security is not only limiting acess to the resources; İt is mainly structring the acess to the match the business needs and ensure the availability of the resources. To demonstrate these principals, the deployment of a secure environment for different enterprises level companies will be examined. In this thesis, the acess requirement and restriction for the different group of security infrastructeres will be examined. The business operation will be detailed as well as the priority of the resources in terms of business interest in order to design a network that match the business model. An overview of the security layers will be shown. The intent is to demonstrate that no designs are perfect and may not resist to some type of attacks. In order to optimize the cost on security, the assets under risk should be taken into consideration. The case studies mentioned in the thesis vary from simple ones to more complicated ones. That is strongly related to what you store in databases. In all the cases it is considered that database is the core business and should be protected. Both inward and outward traffic should be under control in order to by-pass the attacks. There is never perfect security, but increasing the security for a small amount will result a bigger prevention against attacks












