With the progress of technology and mankind, demand for different job positions has emerged. Reports indicating various new job types in the last decade are continuously published, giving us perspective on where we were a decade ago and where we are now. Most of the jobs are created around new technologies, yet not exclusively as jobs within technology production or usage (e.g., machine learning engineers, data scientists, app developers, etc.), but also as a type of jobs built atop of new technologies (e.g., social media manager, podcast producer, content moderator, etc.). With new job types, there is a gap between qualified employees and employers demands created. Taking into consideration trends that we have seen in the last years, more and more new job types will be created, and we can predict that this gap will become larger as time passes.
Vulnerability Assessment and Penetration Testing (VAPT) is an important component of an organization's overall security strategy. VAPT helps identify security vulnerabilities in a computer system, network, or web application, allowing organizations to take corrective measures to address these vulnerabilities and prevent potential security breaches. By conducting regular VAPT, organizations can improve their security posture and reduce the likelihood of successful attacks. In this paper Metasploit was used to show importance of regular vulnerability assessment of critical systems in order to discover vulnerabilities before attacker do it and exploit them. The authors showed Metasploit beside its usage to conduct a vulnerability assessment, it can be utilized by attackers to harm systems. VAPT is not a one-time event, but rather a ongoing process. As new vulnerabilities are discovered and new threats emerge, organizations need to regularly assess their systems to ensure they are protected.
The study focused on assessing and testing Windows 10 to identify possible vulnerabilities and their ability to withstand cyber-attacks. CVE data, alongside other vulnerability reports, were instrumental in measuring the operating system's performance. Metasploit and Nmap were essential in penetration and intrusion experiments in a simulated environment. The study applied the following testing procedure: information gathering, scanning and results analysis, vulnerability selection, launch attacks, and gaining access to the operating system. Penetration testing involved eight attacks, two of which were effective against the different Windows 10 versions. Installing the latest version of Windows 10 did not guarantee complete protection against attacks. Further research is essential in assessing the system's vulnerabilities are recommending better solutions.
In order to support modern business environment, software engineering has a constant tendency to increase productivity and thus the quality of the software. When recruiting, a biography can tell a lot about an individual, about expertise to do a certain job, but that is often not enough. For this reason, a model for prediction of work habits based on personality types has been introduced in this paper. Through the results of the research, by analyzing the employees of the FitSoft company (Bosnia and Herzegovina), a statement has been made of the existence of a certain correlation between the types of personality and the way they perform their tasks. The purpose of testing personality types is to determine how an individual performs their daily activities, and which features give them the advantage of choosing and performing certain jobs. A proposed model for predicting employees’ habits inside agile software teams based on personality estimates should present a clear insight of all factors that are related to employees, their productivity and business results.
Druga polovina prošlog vijeka okarakterisana je vrtoglavim razvojem računarskeindustrije koja je ubrzo postala osnovni preduslov razvoja svih sektora privrede.Uzimajući u obzir pomenuto, porasla je i potreba za stručnjacima koji će u segmentuposlovanja biti u stanju povezati tehničke i upravljačke zajednice. Rezultat je biopokretanje studija poslovne informatike, pod tim istim, sličnim ili različitim imenima,najčešće u okviru poslovnih škola kao studij prvog ciklusa. Međutim, razvojem upodručju poslovanja, a pogotovo kompjutinga, u novom mileniju se ovaj studij sve višepojavljuje kao samostalan sa tendencijom da postane ravnopravna organizacijskajedinica unutar hijerarhije univerziteta. Ovaj rad ima za cilj da predstavi teoretskuosnovu kurikuluma i praktičan primjer studija Poslovna informatika koji je rezultatzajedničkog rada Ekonomskog fakulteta i Fakulteta informacijskih tehnologijaUniverziteta „Džemal Bijedić“ u Mostaru.
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više