PREVENTIVE AND PROTECTIVE MEASURES FOR USER ACCOUNTS
DOI:
https://doi.org/10.59417/nir.2013.3.43Keywords:
user account, IT security, data protection, hackingAbstract
Today, there is almost no computer user who does not have a user account whether it is an ac- count used to log on to the computer, e-banking, e-mail systems, social networks, chat sessions, Internet telephony, user identification, etc. Afterwards, even the authorization is realised with a given user ac- count. The account allows access to desired service, and the use of the services provided. However, the majority of the user account owners do not take into account the safety of their accounts. Abuse of user accounts can be carried out to execute identity theft (e.g. social network, e-government), to produce repu- tational damage (e.g. e-mail account), and what is most important material damage (e.g. e-banking, data theft). It is not trivial to identify perpetrators of cybercrime, that is why the owners of user accounts must be very careful and take all measures possible to protect their account.
References
Krivični zakonik Republike Srbije, Sl. glasnik RS, br. 85/2005, 88/2005 − ispr., 107/2005 − ispr., 72/2009 i 111/2009.
http://www.toplinestrategies.com/cloudhead/security/how-much-time-is-needed-to-crack-a-
password-by-brute-force/, poslednji put pristupano 20. 02. 2013.
http://www.google.com, poslednji put pristupano 20. 02. 2013.
http://www.24sata.rs/specijal/it/vest/pogledajte- najcesce-koriscene-lozinke-na-hakovanim-sajtovima/47564.phtml, poslednji put pristupano 23. 02. 2013.
PASTEBIN #1 paste tool since 2002, http://pastebin.com, poslednji put pristupano 05. 02. 2013.
Wikipedia, Slobodna enciklopedija, http://www.wikipedia.org, poslednji put pristupano 19. 02. 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 NIR

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.