- citati u SCIndeksu: [3]
- citati u CrossRef-u:[3]
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:16
- preuzimanja u poslednjih 30 dana:11
|
|
2016, vol. 71, br. 5, str. 761-764
|
Pametno konfigurisanje računara kao prevencija od hakovanja i cyber špijuniranja
A smart configuration of computer as a prevention from hacking and cyber espionage
Subotica
Sažetak
U modernom poslovnom svetu, IT sistemi su često meta cyber napada, poslovnog špijuniranja i drugih informatičkih incidenata. Nemali broj današnjih softverskih alata ima i opciju za daljinski pristup drugom računaru i ta mogućnost se često koristi za izvlačenje poverljivih informacija iz sistema, kao i nadzor hakerskih napada. Kao jednu od najpouzdanijih preventivnih mera ovde, naveli bismo koncept pametnog konfigurisanja računara koji omogućava da se informacioni sistemi, u određenoj meri, zaštite od pretnji kao što su hakovanje i cyber špijuniranje. U ovom radu, planiramo da bolje objasnimo slučajeve koji se javljaju u praksi, ali i da kroz praktične savete sugerišemo kako bi realno moglo da se deluje u preventivnom smislu - kako kod kuće, tako i u poslovnom ambijantu.
Abstract
In a modern business world, IT systems are frequently exposed to attacks, business espionage and the other cyber incidents. Many software tools of nowadays got a remote access option to another computer which is suitable for a cyber espionage as well as a hacker's attack monitoring. As one of the most reliable measures here, we would mention a smart configuration of computer which offers a protection from these cyber threats. In this article, we plan to explain the cases that exist in the practice and provide some useful tips which would suggest how to prevent cyber incidents at home as well as within a business environment.
|
|
|
Reference
|
|
*** (2011) Cyber threats to national security. u: Symposium Five: Keeping the Nation’s Industrial Base Safe From Cyber Threats, 2011 CACI International Inc
|
1
|
Ablon, L., Libicki, M.C., Golay, A.A. (2014) Markets for cybercrime tools and stolen data. Sponsored by Juniper Networks
|
|
Beaver, K., Davis, P.T. (2005) Hacking Wireless Networks for Dummies. Wiley Publishing
|
|
Bergman, M.K. (2000) The deep web: Surfacing hidden value. White paper
|
2
|
Charney, S. (2009) Rethinking the cyber threat: A framework and path forward. Microsoft
|
|
Ciancaglini, V., Balduzzi, M., Goncharov, M., McArdle, R. (2013) Deep web and cyber crime. A Trend Micro Research Paper
|
1
|
Cobb, S. (2014) Four basic and effective defensive measures against cybercrime. ESET Business Solutions, Tech Brief
|
|
Fu, X., Zhen, L., Yu, W., Luo, J. (2010) Cyber crime scene investigations (C2SI) through cloud computing. u: 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
|
1
|
Gardiner, M. (2013) The critical incident response maturity journey. EMC, White Paper
|
|
Roney, M.A., Al, H.A., Al, R.K. (2010) Cyber crimes: Threats and protection. u: 2010 International Conference on Networking and Information Technology
|
|
|
|