Book

Uvod u ravcunalnu sigurnost

Authors:
  • University of Zagreb Faculty of Organization and Informatics
... Sophisticated tools require less user knowledge, and with the development of each newcomer to information technology, new methods and techniques, more sophisticated tools and a more sophisticated approach to computer crime are emerging. The effects of cybercrime are becoming more and more dangerous every day, especially when the goals are the privacy of individuals, entire branches of management and even the national security of countries [1]. ...
... The development of computer networks and their integration into the network of all networks or the Internet, enables the unrestricted movement of computer crime beyond national borders and enables it to scale globally. In addition to cybercrime, other forms of crime (especially organized crime) that have been able to use the Internet as a medium of transmission are transcending national boundaries [1]. ...
Article
Full-text available
Computer crime is a form of criminal behavior in which the use of computer technology and information systems is manifested as a mode of crime or the computer is used as a means or purpose of perpetration with which is producing some relevant criminal consequence. Computer crime is also an unlawful violation of property in which computer data is intentionally altered (manipulated by a computer), destroyed (computer sabotaged) or used in conjunction with hardware (theft of time). Objective of this paper is consideration of using new computer technology in everyday life. Unfortunately, some users using new technology for criminal acts. For Analysis, author use official resources from books, scientific papers and online resources. Even though it is a new technology, police and justice successfully deal with different types of computercrimes.
... When it starts working, it will change its UID to a username that it specified in a configuration file. [18] ...
Article
Full-text available
This article presents the purchase management information system, finance management information system and security information system, their interdependence and tight correlation. Furthermore, we state the goals of the purchase management information system that must be achieved in any organisation, as the purchase (sub)process is carried out in every organisation. P-K matrix gives a detailed presentation of a public organisation, and data classes and sub-processes within the observed organisation. Other companies involved in similar activities can perform their processes in accordance with the presented business technology matrix. The business technology matrix was used for designing a data flow process diagram comprising data flow, warehouses, processes and the external entity which can also be used in such companies. The article also deals with the duration of the sub-processes. The duration of sub-processes must be reduced as much as possible in order to achieve the planned result at the process output point. A hypothesis was set in the article, for the period from the beginning of 2009 until the end of 2010. We observed whether the total cost-effectives coefficient in the company would fall under the threshold value of 1. The article has proven that, based on the sample (profit-and-loss account), there is no reason to discard the H0 hypothesis, as the company's total cost-effectiveness coefficient did not fall below the permitted value of 1 for two years. The third section of the article presents the possible threat to organisations' information systems, and describes methods of protecting electronic information in processes, and recovering electronic databases in finance management information systems.
ResearchGate has not been able to resolve any references for this publication.