Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Purpose: The aim of the article is to analyse selected aspects of network threats and Internet activity of the organization's employees. Design/methodology/approach: The article consists of two parts. The first one is theoretical. The second is a case study of an educational organization along with an analysis of selected aspects. Findings: Some network applications used by employees carry a high risk for the organization. On the one hand, they can be a vector of malware in an organization, they can contain the latest security vulnerabilities, use significant network resources or can hide the activity of attackers. On the other hand, they are of little importance to business: they are not related to the work and the activities of the organization. Practical implications: Analysis of user activity in the context of information security allows achieving tangible benefits, especially in increasing the level of information security. It also gives you the ability to tune and better match existing security solutions or implement new ones. Originality/value: This article contains a case study of a university unit in terms of threats related to users' online activity. The article presents the actual data collected for a period of eighteen months related to the activity of users on the network, as well as threats that have been recorded in the organization.
EN
The study presents the phenomenon of organized crime and its definition. This phenomenon was captured under criminal law. The most important areas of activity of contemporary organized criminal groups were also discussed. At the same time, attempts were made to define operational and reconnaissance activities in terms of doctrine and the characteristics of the most important features of these activities carried out by law enforcement agencies. The study also discusses the methods of selected operational-reconnaissance activities and attempts to categorize them.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.