Your browser does not allow JavaScript!
JavaScript is necessary for the proper functioning of this website. Please enable JavaScript or use a modern browser.
|
|
SLO
|
ENG
|
Cookies and privacy
DKUM
EPF - Faculty of Business and Economics
FE - Faculty of Energy Technology
FERI - Faculty of Electrical Engineering and Computer Science
FF - Faculty of Arts
FGPA - Faculty of Civil Engineering, Transportation Engineering and Architecture
FKBV - Faculty of Agriculture and Life Sciences
FKKT - Faculty of Chemistry and Chemical Engineering
FL - Faculty of Logistic
FNM - Faculty of Natural Sciences and Mathematics
FOV - Faculty of Organizational Sciences in Kranj
FS - Faculty of Mechanical Engineering
FT - Faculty of Tourism
FVV - Faculty of Criminal Justice and Security
FZV - Faculty of Health Sciences
MF - Faculty of Medicine
PEF - Faculty of Education
PF - Faculty of Law
UKM - University of Maribor Library
UM - University of Maribor
UZUM - University of Maribor Press
COBISS
Faculty of Business and Economic, Maribor
Faculty of Agriculture and Life Sciences, Maribor
Faculty of Logistics, Celje, Krško
Faculty of Organizational Sciences, Kranj
Faculty of Criminal Justice and Security, Ljubljana
Faculty of Health Sciences
Library of Technical Faculties, Maribor
Faculty of Medicine, Maribor
Miklošič Library FPNM, Maribor
Faculty of Law, Maribor
University of Maribor Library
Bigger font
|
Smaller font
Introduction
Search
Browsing
Upload document
For students
For employees
Statistics
Login
First page
>
Show document
Show document
Title:
VARNOSTNA POLITIKA NA PODROČJU INFORMATIKE
Authors:
ID
Trampuš, Mirjana
(Author)
ID
Bobek, Samo
(Mentor)
More about this mentor...
Files:
VS_Trampus_Mirjana_2009.pdf
(765,33 KB)
MD5: 1CBECA6A66716D92A7566767BBF964E0
PID:
20.500.12556/dkum/03db4489-40c1-486d-a2b1-145f8afaa46b
Language:
Slovenian
Work type:
Undergraduate thesis
Organization:
EPF - Faculty of Business and Economics
Abstract:
Varnost informacij in informacijskih sistemov v banki je zelo pomembna. V bankah se srečujemo z različnimi oblikami tveganj, ki ogrožajo poslovanje. Edini način za obvladovanje tveganj informacijskih sistemov je učinkovito inplementiranje varnostne politike.
Keywords:
informacija
,
obvladovanje tveganj
,
revizija informacijskih sistemov
,
računalniški sistemi
,
varnost
,
grožnje in napadi
,
varnostne metode
Place of publishing:
Pesje
Publisher:
[M. Trampuš]
Year of publishing:
2009
PID:
20.500.12556/DKUM-10649
UDC:
659.2:004
COBISS.SI-ID:
10017820
NUK URN:
URN:SI:UM:DK:XFEMUT8Q
Publication date in DKUM:
01.12.2009
Views:
2889
Downloads:
283
Metadata:
Categories:
EPF
Cite this work
Plain text
BibTeX
EndNote XML
EndNote/Refer
RIS
ABNT
ACM Ref
AMA
APA
Chicago 17th Author-Date
Harvard
IEEE
ISO 690
MLA
Vancouver
:
TRAMPUŠ, Mirjana, 2009,
VARNOSTNA POLITIKA NA PODROČJU INFORMATIKE
[online]. Bachelor’s thesis. Pesje : M. Trampuš. [Accessed 17 April 2025]. Retrieved from: https://dk.um.si/IzpisGradiva.php?lang=eng&id=10649
Copy citation
Average score:
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
(0 votes)
Your score:
Voting is allowed only for
logged in
users.
Share:
Similar works from our repository:
Diskretna regulacija krogle na plošči
Simulacije dinamičnih sistemov
Zbornik povzetkov študentskih projektov
Automatization of filling line
Wavelets in electrochemical noise analysis
Similar works from other repositories:
Preizkuševalnik funkcij strojev
Postavitev praktičnega izobraževanja za avtomatsko vodenje
Izbira pretvornika signalov za laboratorijske potrebe
Ovrednotenje antropocentričnosti sistema za vodenje šaržne nevtralizacije po metodi vzporednega načrtovanja
Izdelava in avtomatizacija linije za nanos trdih slojev
Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.
Secondary language
Language:
English
Title:
INFORMATION SYSTEMS SECURITY POLICY IN BANKING
Abstract:
Taking into account that banks and other organizations are exposed to various risks, it is important for them to start by performing risk analysis.Information security includes the protection and safeguarding of all critical, business sensitive, personal and confidential information and the information systems which are intended to process these data.
Keywords:
information
,
risk management
,
information systems audit
,
computer systems
,
security
,
threats and attacks
,
security methods
Comments
Leave comment
You must
log in
to leave a comment.
Comments (0)
0 - 0 / 0
There are no comments!
Back