Please use this identifier to cite or link to this item:
http://hdl.handle.net/2445/182792
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Roca Cánovas, Raúl | - |
dc.contributor.author | Travé Gordillo, Joan | - |
dc.date.accessioned | 2022-01-28T10:01:20Z | - |
dc.date.available | 2022-01-28T10:01:20Z | - |
dc.date.issued | 2021-06-20 | - |
dc.identifier.uri | http://hdl.handle.net/2445/182792 | - |
dc.description | Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2021, Director: Raúl Roca Cánovas | ca |
dc.description.abstract | [en] In this final degree work, a platform has been developed to store and visualize cyber-attacks, as well as to manage multiple organizations in this field. The visualization has been done by projecting the strategic geographical coordinates - offices, which are the destination of the attacks, and the origin of the attacks itself - on two dynamic maps, using the Leaflet library of geographical data representation for Javascript. The responsibility for securing the resource API has been divided between the API itself, which is responsible for differentiating which users can access each resource, and the API that provides tokens, so that the users of the project are not tied to the resource API, and in case of extending the set of projects of the hypothetical company that has developed this project, users could use the new projects with the same account that they have created for this one. A comparison of technologies, including databases, frameworks for front end, back end, and containers, has been made, and has ended up exploring the MongoDB and PostgreSQL databases - as well as their respective development ecosystems for Windows -, the React framework for Javascript, the Flask framework for Python, the Swagger documentation tool, the bearer token type and the Docker container. As context, the main typology of online cyber-attacks was learned, as well as the most common strategies by attackers. | ca |
dc.format.extent | 44 p. | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | cat | ca |
dc.rights | memòria: cc-nc-nd (c) Joan Travé Gordillo, 2021 | - |
dc.rights | codi: GPL (c) Joan Travé Gordillo, 2021 | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | - |
dc.rights.uri | http://www.gnu.org/licenses/gpl-3.0.ca.html | * |
dc.source | Treballs Finals de Grau (TFG) - Enginyeria Informàtica | - |
dc.subject.classification | Seguretat informàtica | ca |
dc.subject.classification | Seguretat de les xarxes d'ordinadors | ca |
dc.subject.classification | Programari | ca |
dc.subject.classification | Treballs de fi de grau | ca |
dc.subject.classification | Delictes informàtics | ca |
dc.subject.classification | Visualització de la informació | ca |
dc.subject.classification | Disseny de pàgines web | ca |
dc.subject.other | Computer security | en |
dc.subject.other | Computer network security | en |
dc.subject.other | Computer software | en |
dc.subject.other | Computer crimes | en |
dc.subject.other | Information visualization | en |
dc.subject.other | Bachelor's theses | en |
dc.subject.other | Web site design | en |
dc.title | Implementació d'una plataforma de gestió i visualització de ciberatacs | ca |
dc.type | info:eu-repo/semantics/bachelorThesis | ca |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | ca |
Appears in Collections: | Programari - Treballs de l'alumnat Treballs Finals de Grau (TFG) - Enginyeria Informàtica |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
codi.zip | Codi font | 757.59 kB | zip | View/Open |
tfg_joan_trave_gordillo.pdf | Memòria | 1.6 MB | Adobe PDF | View/Open |
This item is licensed under a
Creative Commons License