<?xml version="1.0"?><rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:edm="http://www.europeana.eu/schemas/edm/" xmlns:wgs84_pos="http://www.w3.org/2003/01/geo/wgs84_pos" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdaGr2="http://rdvocab.info/ElementsGr2" xmlns:oai="http://www.openarchives.org/OAI/2.0/" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:ore="http://www.openarchives.org/ore/terms/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:dcterms="http://purl.org/dc/terms/"><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-D44J03ZX/741f0e56-a724-45cc-abd6-7593dee26c45/IMAGE"><dcterms:extent>285 KB</dcterms:extent></edm:WebResource><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-D44J03ZX/872-8254ef5abe64be-85af79233bf3f5-6-/PDF"><dcterms:extent>155 KB</dcterms:extent></edm:WebResource><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-D44J03ZX/283763bf-7fe4-43a8-85eb-f95e2a5f6b25/TEXT"><dcterms:extent>17 KB</dcterms:extent></edm:WebResource><edm:TimeSpan rdf:about="2013-2024"><edm:begin xml:lang="en">2013</edm:begin><edm:end xml:lang="en">2024</edm:end></edm:TimeSpan><edm:ProvidedCHO rdf:about="URN:NBN:SI:DOC-D44J03ZX"><dcterms:isPartOf rdf:resource="https://www.dlib.si/details/URN:NBN:SI:spr-CFT6PFGK" /><dcterms:issued>2024</dcterms:issued><dc:creator>Abramov, Andrej</dc:creator><dc:format xml:lang="sl">številka:7/8</dc:format><dc:format xml:lang="sl">letnik:79</dc:format><dc:format xml:lang="sl">str. 471-477, 527-528</dc:format><dc:identifier>ISSN:0032-6976</dc:identifier><dc:identifier>COBISSID_HOST:212156675</dc:identifier><dc:identifier>URN:URN:NBN:SI:doc-D44J03ZX</dc:identifier><dc:language>sl</dc:language><dc:publisher xml:lang="sl">Zveza društev pravnikov Slovenije</dc:publisher><dcterms:isPartOf xml:lang="sl">Pravnik</dcterms:isPartOf><dc:subject xml:lang="en">artificial intelligence</dc:subject><dc:subject xml:lang="en">cyber security</dc:subject><dc:subject xml:lang="en">data</dc:subject><dc:subject xml:lang="sl">digitalizacija</dc:subject><dc:subject xml:lang="en">digitisation</dc:subject><dc:subject xml:lang="sl">kibernetska varnost</dc:subject><dc:subject xml:lang="sl">NIS 2</dc:subject><dc:subject xml:lang="sl">podatki</dc:subject><dc:subject xml:lang="sl">Slovenija</dc:subject><dc:subject xml:lang="sl">UI</dc:subject><dc:subject xml:lang="sl">umetna inteligenca</dc:subject><dcterms:temporal rdf:resource="2013-2024" /><dc:title xml:lang="sl">Kibernetska varnost v Republiki Sloveniji - previdnosti ni nikoli preveč|</dc:title><dc:description xml:lang="sl">The increasing importance of cyber security is becoming crucial across various sectors, from large corporations and the financial industry to small businesses and government institutions. With increasing digitisation and increasing amounts of sensitive data being transferred and stored, the need for effective cyber security measures becomes increasingly evident. Despite growing interest and demand, considerable confusion persists in the market regarding the correct approaches and solutions. Companies and organisations often face challenges in selecting appropriate technologies, implementing security strategies and complying with legislative requirements. The author explores the meaning and normative framework of cyber security, as well as the most important aspects and trends that must be taken into account when handling data. Predictions for the coming years indicate that popular operating systems, such as macOS, will become more vulnerable, and cybercriminals will continue to exploit artificial intelligence to create sophisticated attacks. Therefore, a comprehensive approach to protecting and enhancing security is needed. This approach should include raising employee awareness, deploying advanced technologies, and developing clear policies and protocols</dc:description><dc:description xml:lang="sl">Pomen kibernetske varnosti postaja vse bolj ključen v različnih sektorjih – od velikih korporacij in finančne industrije do malih podjetij in vladnih institucij. Z naraščajočo digitalizacijo in povečevanjem količine občutljivih podatkov, ki se prenašajo in shranjujejo, je potreba po učinkovitih kibernetskih varnostnih ukrepih čedalje izrazitejša. Kljub naraščajočemu zanimanju in povpraševanju pa je na trgu še vedno precejšnja zmeda glede pravilnih pristopov in rešitev. Podjetja in organizacije se pogosto soočajo z izzivi pri izbiri ustreznih tehnologij, uvedbi varnostnih strategij in usklajevanju z zakonodajnimi zahtevami. Avtor v prispevku predstavi pomen in normativni okvir kibernetske varnosti ter najpomembnejše vidike in trende, ki jih je treba upoštevati pri ravnanju s podatki. Napovedi za prihodnja leta sicer kažejo, da bodo priljubljeni operacijski sistemi, kot je macOS, postali ranljivejši, kibernetski kriminalci pa bodo še naprej uporabljali umetno inteligenco za ustvarjanje naprednih napadov. Zato je potreben celovit pristop k zaščiti in povečanju varnosti, vključno z dvigom ozaveščenosti zaposlenih, uvajanjem naprednih tehnologij ter razvojem jasnih politik in protokolov</dc:description><edm:type>TEXT</edm:type><dc:type xml:lang="sl">znanstveno časopisje</dc:type><dc:type xml:lang="en">journals</dc:type><dc:type rdf:resource="http://www.wikidata.org/entity/Q361785" /></edm:ProvidedCHO><ore:Aggregation rdf:about="http://www.dlib.si/?URN=URN:NBN:SI:DOC-D44J03ZX"><edm:aggregatedCHO rdf:resource="URN:NBN:SI:DOC-D44J03ZX" /><edm:isShownBy rdf:resource="http://www.dlib.si/stream/URN:NBN:SI:DOC-D44J03ZX/872-8254ef5abe64be-85af79233bf3f5-6-/PDF" /><edm:rights rdf:resource="http://rightsstatements.org/vocab/InC/1.0/" /><edm:provider>Slovenian National E-content Aggregator</edm:provider><edm:intermediateProvider xml:lang="en">National and University Library of Slovenia</edm:intermediateProvider><edm:dataProvider xml:lang="sl">Univerza v Ljubljani, Pravna fakulteta</edm:dataProvider><edm:object rdf:resource="http://www.dlib.si/streamdb/URN:NBN:SI:DOC-D44J03ZX/maxi/edm" /><edm:isShownAt rdf:resource="http://www.dlib.si/details/URN:NBN:SI:DOC-D44J03ZX" /></ore:Aggregation></rdf:RDF>