Akcije

Journal of Process Management. New Technologies
kako citirati ovaj članak
podeli ovaj članak

Metrika

  • citati u SCIndeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[]
  • posete u poslednjih 30 dana:17
  • preuzimanja u poslednjih 30 dana:17

Sadržaj

članak: 8 od 21  
Back povratak na rezultate
2013, vol. 1, br. 1, str. 14-19
Computer security and security technologies
(naslov ne postoji na srpskom)
aCollege for professional studies educators, Aleksinac
bnema
Ključne reči: computer security; security technologies; threats; security; protection of computer
Sažetak
(ne postoji na srpskom)
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.
Reference
*** Criminal Code RS. art. 112 page 18 and art. 303
*** Expert comment Code of Criminal Procedure in offenses against the security of computer data
Engst, A., Fleishman, G. (2004) Wireless networking. Cacak: Computer Library
LAN (1999) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Computer Society, 1999 edition, IEEE standard 802.11
Lazarevic, L. Commentary of the Criminal Code of the Republic of Serbia. page. 750, 751
Ruth, A., Hudson, K. (2004) Security + certification. Beograd: Computer CET
Seen, J.A. (2007) Information technology: Principles, practices, opportunities, computer library. Belgrade
Stošić, L., Bogdanović, M. (2012) RC4 stream cipher and possible attacks on WEP. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No. 3, march 2012, (pp. 110-114), ISSN 2156-5570 (Online), ISSN 2158-107X (Print), https://www.thesai.org/Downloads/Volume3No3/Paper19-RC4_Stream_Cipher_And_Possible_Attacks_On_WEP.pdf
 

O članku

jezik rada: engleski
vrsta rada: neklasifikovan
DOI: 10.5937/JPMNT1301014S
objavljen u SCIndeksu: 18.08.2017.

Povezani članci

Nema povezanih članaka