Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the polylang domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/securityacademy/public_html/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":877,"date":"2022-02-03T12:07:38","date_gmt":"2022-02-03T11:07:38","guid":{"rendered":"https:\/\/securityacademy.rs\/?p=877"},"modified":"2023-01-16T19:40:48","modified_gmt":"2023-01-16T18:40:48","slug":"sifru-svoju-gubim","status":"publish","type":"post","link":"https:\/\/securityacademy.rs\/2022\/02\/03\/sifru-svoju-gubim\/","title":{"rendered":"\u0160ifru svoju gubim…"},"content":{"rendered":"

Jeste li dobili simpati\u010dnu poruku administratora neke stranice koje redovno pose\u0107ujete, ne daj bo\u017ee, od banke, da je neko iz Indonezije pristupio va\u0161oj stranici no\u0107as u tri? Ako do sada niste, smatrajte se nevi\u0111enim sre\u0107nikom. Podaci ka\u017eu da se uspe\u0161an upad i proboj lozinke desi svakom u poslovnom i privatnom \u017eivotu makar jednom u \u017eivotu, a na\u0161i online \u017eivoti prili\u010dno su duga\u010dki i trajni, dakle, spremite se na najgore pre ili kasnije.
\nKako do toga do\u0111e? National Cxber Security Centre ka\u017ee da postoji nekoliko na\u010dina na koji oni koji \u017eele da do\u0111u u posed va\u0161ih podataka mogu u tome da uspeju.
\nBrutalna sila \u2013 automatsko naga\u0111anje re\u0111anjem milijardi kombinacija, sve dok se ne prona\u0111e ona prava. Ovakav na\u010din je najsporiji i najskuplji jer tro\u0161i ogromno vreme, zato se koristi za upade u ozbiljno va\u017ene ili bogate firme ili institucije.
\nRu\u010dno naga\u0111anje – nasumi\u010dno poga\u0111anje brojeva i re\u010di vrlo \u010desto donosi uspeh? Vrlo \u010desto? Ve\u0107ina kao kombinaciju odabere ime ili nadimak, nadimak ljubimca i godinu ili datum ro\u0111enja \u2013 svoj, svog partnera, dece ili ku\u0107nog ljubimca. Uve\u017ebanom hakeru ne\u0107e trebati vi\u0161e od pola sata.
\nPresretanje \u2013 lozinke se mogu presretati ako se prenose preko mre\u017ee izme\u0111u umre\u017eenih kompjutera. Ako ni\u0161ta drugo, instaliranjem \u0161pijunskog softvera ili naga\u0111anjem najslabije za\u0161ti\u0107enog kompjutera u mre\u017ei.
\nKra\u0111a lozinke \u2013 \u0161ifre pohranjene na fizi\u010dki dostupno mesto, napisane na papiri\u0107e zalepljene za monitor ili u nekom otvorenom dokumentu, originalnog naziva \u201e\u0160ifre\u201c skrati\u0107e lopovima posao.
\nSocijalni in\u017eenjering \u2013 iskusni hakeri koriste metode ispitivanja i iznu\u0111ivanja podataka, kako bi od sagovornika saznali \u0161ifre ili podatke od kojih se njihove \u0161ifre sastoje. Bacanje udice obi\u010dno ide pozivima na la\u017eni sajt, da ukucate novu \u0161ifru \u201ejer se va\u0161a stara izgubila\u201c ili vam nude da kliknete na besplatni softver za za\u0161titu \u2013 koji je ustvari malver. I la\u017eno predstavljanje daje rezultate: kad vam ka\u017eu da ste bogati naslednik nepostoje\u0107eg ujaka iz Amerike, jasno vam je da sklanjate prste od tastature, ali \u0161ta ako vam se javi \u201edrugarica iz osnovne\u201c i tra\u017ei broj telefona i da platite kotizaciju za stogodi\u0161njicu mature?
\nKi-logeri \u2013 mini programi koji se instaliraju na va\u0161 kompjuter i bele\u017ee svaki udar prsta u tastaturu. Neminovno \u0107e zabele\u017eiti i va\u0161e \u0161ifre koje kucate.
\nSurfovanje preko ramena \u2013 prostor u kome se nalaze serveri i kompjuterske jedinice ne zove se za d\u017eabe \u0161ti\u0107eni prostor \u2013 u njemu je zabranjen boravak neovla\u0161\u0107enih lica. Ako vam do\u0111u majstori da zamene patrone za vodu ili odnesu \u0161tampa\u010d na popravku, potrudite se da vam ne \u201evise\u201c na le\u0111ima, sklonite sve \u0161to mo\u017ee da otkrije va\u0161u poziciju, podatke iz firme, uklju\u010duju\u0107i i \u0161ifre.
\n4 \u2013 prose\u010dan broj sajtova koje koristimo s istom \u0161ifrom
\n22 \u2013 prose\u010dan broj online \u0161ifri gra\u0111ana Ujedinjenog Kraljevstva. Mnoge od njih su iste.<\/p>\n

Kako se za\u0161tititi?
\n1. Izbacite iz misli uobi\u010dajene \u0161ifre, poput 123456 ili 99999
\n2. Pratite broj poku\u0161aja pristupa. Obu\u010dite se u prepoznavanju sumnjivih aktivnosti. Ne delite \u0161ifru.
\n3. Ne \u010duvajte \u0161ifre u formatu obi\u010dnog teksta. Ako je u Wordu, za\u0161titite ga lozinkom.
\n4. Kad se programi a\u017euriraju, obavezno potom promenite \u0161ifre.
\n5. Koristite dvofaktorsku autentifikaciju. Smara, ali je veoma korisna. Smara.
\n6. Koristite \u0161ifre samo tamo gde je to zaista neophodno. Tako \u0107ete smanjiti \u0161ansu da \u0161ifru za neki va\u017ean sajt ponovite na nekom lako dostupnom, i tako otvorite zadanja vrata svog kompjutera za kradljivce.
\nAKO STE POSLODAVAC
\n7. Dozvolite korisnicima da na sigurno smeste i zapamte svoje \u0161ifre. Postoji dosta programa i ad-ona za \u010duvanje \u0161ifara, svi koriste master \u0161ifru, a mnogi i dvofaktorsku autentifikaciju.
\n8. Dozvolite korisnicima da lako, brzo i jednostavno resetuju \u0161ifru. Ne napla\u0107ujte im gre\u0161ku, skupo \u0107e vas ko\u0161tati.
\n9. Ulo\u017eite u softver, kako biste se obezbedili da korisnici mogu da upotrebe i jednostavnije \u0161ifre. Isplati se.
\n10. Napravite listu zabranjjenih \u0161ifara i kombinacija.
\n11. Zabranite korisnicima da \u0161ifre s posla koriste i na ku\u0107nim kompjuterima i programima.
\n12. Obu\u010dite osoblje da pravi \u0161ifre koje se ne\u0107e lako pogoditi.<\/p>\n","protected":false},"excerpt":{"rendered":"

Jeste li dobili simpati\u010dnu poruku administratora neke stranice koje redovno pose\u0107ujete, ne daj bo\u017ee, od banke, da je neko iz Indonezije pristupio va\u0161oj stranici no\u0107as u tri? Ako do sada niste, smatrajte se nevi\u0111enim sre\u0107nikom. Podaci ka\u017eu da se uspe\u0161an upad i proboj lozinke desi svakom u poslovnom i privatnom \u017eivotu makar jednom u \u017eivotu, […]<\/p>\n","protected":false},"author":1,"featured_media":878,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[87],"tags":[31,25,29,27,35,37,33,41,39],"class_list":["post-877","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-biranje-lozinke","tag-lozinka-sifra","tag-lozinka-sifra-slabost","tag-lozinka-slabost","tag-najcesce-lozinke","tag-najcesce-sifre","tag-sifra-sigurnost","tag-zastita-lozinka","tag-zastita-sifra"],"_links":{"self":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts\/877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/comments?post=877"}],"version-history":[{"count":4,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts\/877\/revisions"}],"predecessor-version":[{"id":882,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts\/877\/revisions\/882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/media\/878"}],"wp:attachment":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/media?parent=877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/categories?post=877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/tags?post=877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}