Design, implementation and security of a typical educational laboratory computer network
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F62156489%3A43110%2F13%3A00201082" target="_blank" >RIV/62156489:43110/13:00201082 - isvavai.cz</a>
Výsledek na webu
<a href="http://dx.doi.org/10.11118/actaun201361041077" target="_blank" >http://dx.doi.org/10.11118/actaun201361041077</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.11118/actaun201361041077" target="_blank" >10.11118/actaun201361041077</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Design, implementation and security of a typical educational laboratory computer network
Popis výsledku v původním jazyce
Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts), and four essential security rules are stipulated (enforceable end host security,controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments), which protect the rest of the laboratory infrastructure as well as the outer university network and the Inter
Název v anglickém jazyce
Design, implementation and security of a typical educational laboratory computer network
Popis výsledku anglicky
Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts), and four essential security rules are stipulated (enforceable end host security,controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments), which protect the rest of the laboratory infrastructure as well as the outer university network and the Inter
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2013
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis
ISSN
1211-8516
e-ISSN
—
Svazek periodika
61
Číslo periodika v rámci svazku
4
Stát vydavatele periodika
CZ - Česká republika
Počet stran výsledku
11
Strana od-do
1077-1087
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—