Title Sigurnost informacijskih sustava
Title (english) Information Systems Security
Author Juraj Ciglenečki
Mentor Mile Vičić (mentor)
Committee member Valentina Vinšalek Stipić (predsjednik povjerenstva)
Committee member Marija Baburić Vranešić (član povjerenstva)
Committee member Mile Vičić (član povjerenstva)
Granter Polytechnic Nikola Tesla in Gospić (Business department) Gospić
Defense date and country 2020-09-24, Croatia
Scientific / art field, discipline and subdiscipline SOCIAL SCIENCES Economics
Abstract Informacije su uvijek bile važan čimbenik ljudske aktivnosti. Kao resurs koji je vodio ljudsku
aktivnost, informacije su se prikupljale, čuvale, analizirale i distribuirale na različite načine kroz
povijest, ali su se i krale i zloupotrebljavale. Samim razvojem Interneta, paralelno se razvija i
kibernetički kriminal koji narušava sigurnost informacijskih sustava. Informacijski sustavi se
mogu podijeliti prema organizacijskoj strukturi, razini podrške, poslovnoj funkciji koju
održavaju i prema arhitekturi sustava. Jedan od najpoznatijih informacijskih sustava je MS
Office paket. Organizacije se sve više oslanjaju na informacijske sustave (IS) radi poboljšanja
poslovanja i rada, što olakšava odlučivanje menadžmenta i implementiranje poslovne strategije.
Posebna potreba i ovisnost o IS-u se povećala u trenutnim poslovnim okruženjima gdje se
različite transakcije, trgovanje robom i uslugama obavlja isključivo elektroničkim putem.
Povećana organizacijska ovisnost o IS-u dovela je do odgovarajućeg porasta utjecaja
zloupotrebe IS sigurnosti. Podjela cijele zaštite umreženih sustava, prema razinama je sljedeća:
hardversko-softverska zaštita i sigurnost, fizička i organizacijska zaštita i sigurnost,
zakonodavna zaštita i sigurnost te komunikacijska zaštita (kriptozaštita) i informacijska
sigurnost. Najpoznatiji kibernetički napad je WannaCry te je korisnik zaraženog računala
morao platiti određenu svotu novca ukoliko je želio dobiti ponovni pristup vlastitom računalu.
Abstract (english) Information has always been an important factor in human activity. As a resource that has
guided human activity, information has been collected, stored, analyzed, and distributed in
various ways throughout history, but it has also been stolen and misused. With the development
of the Internet, cybercrime is developing in parallel, which violates the security of information
systems. Information systems can be divided according to organizational structure, level of
support, business function they maintain and according to the system architecture. One of the
most famous information systems is the MS Office suite. Organizations are increasingly relying
on information systems (IS) to improve business and operations, making it easier for
management to make decisions and implement business strategies. The special need and
dependence on IS has increased in the current business environments where various
transactions, trade in goods and services are done exclusively electronically. Increased
organizational dependence on IS has led to a corresponding increase in the impact of IS security
abuse. The division of the entire protection of networked systems, according to the levels, is as
follows: hardware-software protection and security, physical and organizational protection and
security, legislative protection and security, and communication protection (crypto-protection)
and information security. The most notorious Cyber-attack is WannaCry and the user of the
infected computer had to pay a certain amount of money if he wanted to regain access to his
own computer.
Keywords
informacijski sustav
sigurnost
zaštita
kibernetički napad
Internet
Keywords (english)
nformation system
security
protection
Cyber-attack
Internet
Language croatian
URN:NBN urn:nbn:hr:107:353137
Study programme Title: Economics of entrepreneurship Study programme type: professional Study level: undergraduate Academic / professional title: stručni/a prvostupnik/prvostupnica (baccalaureus/baccalaurea) ekonomije (stručni/a prvostupnik/prvostupnica (baccalaureus/baccalaurea) ekonomije)
Type of resource Text
File origin Born digital
Access conditions Access restricted to students and staff of home institution
Terms of use
Created on 2020-10-14 10:16:22