{"?xml":{"@version":"1.0"},"edm:RDF":{"@xmlns:dc":"http://purl.org/dc/elements/1.1/","@xmlns:edm":"http://www.europeana.eu/schemas/edm/","@xmlns:wgs84_pos":"http://www.w3.org/2003/01/geo/wgs84_pos","@xmlns:foaf":"http://xmlns.com/foaf/0.1/","@xmlns:rdaGr2":"http://rdvocab.info/ElementsGr2","@xmlns:oai":"http://www.openarchives.org/OAI/2.0/","@xmlns:owl":"http://www.w3.org/2002/07/owl#","@xmlns:rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","@xmlns:ore":"http://www.openarchives.org/ore/terms/","@xmlns:skos":"http://www.w3.org/2004/02/skos/core#","@xmlns:dcterms":"http://purl.org/dc/terms/","edm:WebResource":[{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-IOACS3XN/619feca4-cda7-458a-ac29-feb97214c6c0/PDF","dcterms:extent":"3671 KB"},{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-IOACS3XN/ee83c88b-8cf2-4919-94f6-7e383d2d8435/TEXT","dcterms:extent":"24 KB"}],"edm:TimeSpan":{"@rdf:about":"1993-2025","edm:begin":{"@xml:lang":"en","#text":"1993"},"edm:end":{"@xml:lang":"en","#text":"2025"}},"edm:ProvidedCHO":{"@rdf:about":"URN:NBN:SI:DOC-IOACS3XN","dcterms:isPartOf":[{"@rdf:resource":"https://www.dlib.si/details/URN:NBN:SI:spr-PGKNDR0J"},{"@xml:lang":"sl","#text":"Uporabna informatika (Ljubljana)"}],"dcterms:issued":"2003","dc:creator":["Brumen, Boštjan","Jaušovec, Matjaž","Welzer-Družovec, Tatjana"],"dc:format":[{"@xml:lang":"sl","#text":"letnik:11"},{"@xml:lang":"sl","#text":"številka:2"},{"@xml:lang":"sl","#text":"str. 61-67"}],"dc:identifier":["ISSN:1318-1882","COBISSID_HOST:8165910","URN:URN:NBN:SI:doc-IOACS3XN"],"dc:language":"sl","dc:publisher":{"@xml:lang":"sl","#text":"Slovensko društvo Informatika"},"dc:subject":[{"@xml:lang":"sl","#text":"analiza ogroženosti"},{"@xml:lang":"en","#text":"analysis of security risk"},{"@xml:lang":"en","#text":"data protection"},{"@xml:lang":"sl","#text":"informacijski sistemi"},{"@xml:lang":"en","#text":"information systems"},{"@xml:lang":"en","#text":"security"},{"@xml:lang":"en","#text":"security risk"},{"@xml:lang":"sl","#text":"varnost"},{"@xml:lang":"sl","#text":"varnostna ogroženost"},{"@xml:lang":"sl","#text":"zaščita podatkov"}],"dcterms:temporal":{"@rdf:resource":"1993-2025"},"dc:title":{"@xml:lang":"sl","#text":"Analiza varnostne ogroženosti|"},"dc:description":[{"@xml:lang":"sl","#text":"It is beyond our comprehension to imagine a company operating without the use of the information technology. However, the use of computer system involves unforeseen events, such as irregular operation of the hardware and software equipment, mostly as the consequence of inappropriate handling. In such cases a company loses its money, clients, placed orders, its reputation, to mention just a few. Therefore it is highly recommended to estimate the consequences. In such a way a company adopts a technique by which the occurence of the unforeseen events is prevented. The first part of the article describes a technique called \"Analysis of Security Risk\", which helps to establish and decrease the sensitivity factor of computer system. The second part of the article presents the actual analysis of the security risks, carried out in one of the Slovene companies"},{"@xml:lang":"sl","#text":"Podjetja, ki pri svojem poslovanju ne uporablja računalniškega sistema, si ne moremo več predstavljati. Med uporabo računalniskega sistema lahko pride do neželenega izpada ali nepravilnega delovanja strojne ali programske opreme, večkrat tudi zaradi nepravilne uporabe. Podjetja zaradi tega izgubljajo denar, stranke, naročila in ugled. Zato je smiselno, da izračunajo stroske neželenih dogodkov in da z določenimi tehnikami preprečijo take dogodke. V prvem delu članka predstavljamo tehniko analize ogroženosti, s katero lahko ugotovimo in zmanjšamo ranljivost računalniškega sistema. V drugem delu članka pa predstavljamo analizo ogroženosti v enem izmed slovenskih podjetij"}],"edm:type":"TEXT","dc:type":[{"@xml:lang":"sl","#text":"znanstveno časopisje"},{"@xml:lang":"en","#text":"journals"},{"@rdf:resource":"http://www.wikidata.org/entity/Q361785"}]},"ore:Aggregation":{"@rdf:about":"http://www.dlib.si/?URN=URN:NBN:SI:DOC-IOACS3XN","edm:aggregatedCHO":{"@rdf:resource":"URN:NBN:SI:DOC-IOACS3XN"},"edm:isShownBy":{"@rdf:resource":"http://www.dlib.si/stream/URN:NBN:SI:DOC-IOACS3XN/619feca4-cda7-458a-ac29-feb97214c6c0/PDF"},"edm:rights":{"@rdf:resource":"http://rightsstatements.org/vocab/InC/1.0/"},"edm:provider":"Slovenian National E-content Aggregator","edm:intermediateProvider":{"@xml:lang":"en","#text":"National and University Library of Slovenia"},"edm:dataProvider":{"@xml:lang":"sl","#text":"Slovensko društvo Informatika"},"edm:object":{"@rdf:resource":"http://www.dlib.si/streamdb/URN:NBN:SI:DOC-IOACS3XN/maxi/edm"},"edm:isShownAt":{"@rdf:resource":"http://www.dlib.si/details/URN:NBN:SI:DOC-IOACS3XN"}}}}