| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document Help

Title:Računalniški kriminal in poslovna informatika
Authors:ID Čagran, Sara (Author)
ID Bobek, Samo (Mentor) More about this mentor... New window
Files:.pdf MAG_Cagran_Sara_2023.pdf (1,60 MB)
MD5: 837462353567F5DD3CC97647782F8819
 
Language:Slovenian
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:EPF - Faculty of Business and Economics
Abstract:Vsi mislijo, da je kibernetski kriminal samo kraja osebnih podatkov nekoga. Toda pri opredelitvi izrazov lahko rečemo, da se „kibernetski kriminal nanaša na uporabo elektronske naprave (računalnika, prenosnega računalnika itd.) za krajo podatkov nekoga ali poskus škodovanja nekomu z uporabo računalnika. Poleg tega gre za nezakonito dejavnost, ki vključuje vrsto težav, od kraje do uporabe vašega sistema ali naslova IP kot orodja za storitev kaznivega dejanja. Svet nenehno razvija nove tehnologije, zato se zdaj veliko zanaša na tehnologijo. Večina pametnih naprav je povezana z internetom. Obstajajo koristi in obstajajo tudi tveganja. Eno od tveganj je veliko povečanje števila kibernetskih kriminalitet, ni dovolj varnostnih ukrepov in operacij, ki bi pomagale zaščititi te tehnologije. Računalniška omrežja omogočajo ljudem v kibernetskem prostoru, da v nekaj sekundah dosežejo kateri koli povezani del sveta. Kibernetska kriminaliteta ima lahko različne zakone in predpise iz ene države v drugo, pri tem pa omenja tudi, da je prikrivanje sledi veliko lažje pri zagrešitvi kibernetske kriminalitete in ne resničnih kaznivih dejanj. Organizacije sprejemajo e-poslovanje iz več razlogov in koristi. Nekatere od teh koristi vključujejo boljše upravljanje informacij, boljšo integracijo dobaviteljev in prodajalcev, boljše partnerstvo v kanalih, nižje transakcijske stroške, boljše razumevanje trga in razširjeno geografsko pokritost. Za uspešno izkoriščanje e-poslovanja je običajno potrebna kreativna povezava med strategijo organizacije in tehnologijo, ki jo podpira, in upravljanjem njihovih poslovnih aplikacij informacijske in komunikacijske tehnologije, ki so vse bolj integrirane in konvergentne ter omogočajo prilagodljivo vedenje podjetja in zaposlenih. Kibernetski kriminal poudarja osrednjo vlogo omrežnih računalnikov v naših življenjih, pa tudi krhkost tako na videz trdnih dejstev, kot je identiteta posameznika. Kibernetski kriminal predstavlja za organe pregona velike in resne težave, saj se vsa dejanja lahko zgodijo med velikimi razdaljami na različnih lokacijah. Zaradi tega je za reševanje kibernetskega kriminala danes potrebno mednarodno sodelovanje. Internetno omrežje zajema cel svet in zato kriminalcem omogoča več skrivališč, tako virtualno kot tudi v resničnem svetu. V globalni dobi kibernetskega kriminala se morajo organizacije zaščititi pred razširjenim obsegom groženj. Globalna perspektiva obveščanja o grožnjah je ena ključnih sestavin varnostne zaščite. Osredotočanje predvsem na osnovne zaščite kot npr. šifriranje podatkov, je še vedno ključno za vsa podjetja. Toda nove tehnologije in novi načini uporabe te tehnologije so razširili obseg groženj. Mobilne naprave so se pojavile kot priljubljene tarče. Njihove varnostne zaščite so razmeroma šibke in zasnovane za enostavno uporabo z odvzetimi uporabniki, zaradi česar so omogočene zaščite še šibkejše. Poleg tega, ker stalni trend prinašanja lastne naprave (BYOD) vmešavanje osebnih in korporativnih podatkov na napravah, ti podatki postanejo dostopni prek mobilnih omrežij, ki so pogosto slabo zavarovana. Ko hekerji vdirajo v eno napravo lahko dostopajo do celotnega omrežja uporabnika. Človeški dejavnik je še vedno najpomembnejši element varnosti in je najbolj zahteven. Visoko ciljno usmerjena e-poštna sporočila ali druga sporočila, ki nosijo zlonamerno programsko opremo, vendar se prikrivajo, kot da bi jih poslal prijatelj ali kolega, se je pojavila kot orožje izbire kibernetskega kriminala. Širjenje socialnih omrežij omogoča kibernetskim kriminalcem, da izsledijo povezave med posamezniki, kar vodi do učinkovitejšega ciljanja.
Keywords:e-poslovanje, oblike e-poslovanja, varnost elektronskega poslovanja, računalniški kriminal, hekerji, penetracijski test, prihodnost računalniškega kriminala
Place of publishing:Maribor
Publisher:S. Čagran
Year of publishing:2023
PID:20.500.12556/DKUM-84567 New window
UDC:004.056
COBISS.SI-ID:167846915 New window
Publication date in DKUM:10.10.2023
Views:416
Downloads:71
Metadata:XML DC-XML DC-RDF
Categories:EPF
:
Copy citation
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:Bookmark and Share


Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Licences

License:CC BY-NC-ND 4.0, Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
Link:http://creativecommons.org/licenses/by-nc-nd/4.0/
Description:The most restrictive Creative Commons license. This only allows people to download and share the work for no commercial gain and for no other purposes.
Licensing start date:21.06.2023

Secondary language

Language:English
Title:Computer crime (cybercrime) and business informatics
Abstract:Everyone thinks that cybercrime is just stealing someone's personal information. But defining the terms, we can say that 'Cybercrime refers to the use of an electronic device (computer, laptop, etc.) to steal someone's information or attempt to harm someone using a computer. In addition, it is an illegal activity that involves a range of problems, from theft to using your system or IP address as a tool to serve a crime. The world is constantly developing new technologies, so it now relies heavily on technology. Most smart devices are connected to the Internet. There are benefits and there are risks. One of the risks is a large increase in the number of cybercrimes, there are not enough security measures and operations to help protect these technologies. Computer networks allow people in cyberspace to reach any connected part of the world in seconds. Cybercrime can have different laws and regulations from one country to another, and he also mentions that covering up one's tracks is much easier when committing cybercrime than real crimes. Organizations are adopting e-business for many reasons and benefits. Some of these benefits include better information management, better supplier and vendor integration, better channel partnerships, lower transaction costs, better market understanding and expanded geographic coverage. The successful exploitation of e-business usually requires a creative connection between an organization's strategy and the technology that supports it, and the management of their business information and communication technology applications, which are increasingly integrated and convergent, enabling flexible business and employee behavior. Cybercrime highlights the central role of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity. Cybercrime presents great and serious problems for law enforcement agencies, as all actions can take place over great distances in different locations. For this reason, tackling cybercrime today requires international cooperation. The Internet network spans the entire world and therefore provides criminals with multiple hideouts, both virtual and in the real world. In the global age of cybercrime, organizations must protect themselves against an expanded range of threats. A global threat intelligence perspective is one of the key components of security protection. Focusing primarily on basic protections such as data encryption is still crucial for all businesses. But new technologies and new ways of using that technology have expanded the range of threats. Mobile devices have emerged as popular targets. Their security protections are relatively weak and designed to be easily used by disenfranchised users, making the protections enabled even weaker. Furthermore, as the ongoing trend of bringing your own device (BYOD) mixes personal and corporate data on devices, this data becomes accessible over mobile networks that are often poorly secured. When hackers break into one device, they can access the user's entire network. The human factor is still the most important element of security and is the most demanding. Highly targeted emails or other messages that carry malware but masquerade as being sent by a friend or colleague have emerged as cybercrime's weapon of choice. The proliferation of social networks allows cybercriminals to trace connections between individuals, leading to more effective targeting.
Keywords:e-business, forms of e-business, security of electronic business, computer crime, hackers, penetration test, future of computer crime


Comments

Leave comment

You must log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica