<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:43:41.310Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:4814" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:4814</identifier>
                <datestamp>2017-04-17T15:56:51Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Privileged Identities - Threat to Network and Data Security</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2016</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/4814</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://portal.sinteza.singidunum.ac.rs/Media/files/2016/154-160.pdf</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:17024" confidence="-1">D. Pešić</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-6136-1895" confidence="-1">M. Veinović</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Privileged accounts represent the biggest threat to enterprises. The number of cyber-attacks in which privileged accounts and insiders are involved directly or indirectly, has significantly increased in recent years. All-powerful access with the lack of accountability creates a risk which can certainly cause damage of immense proportions. Widespread use of virtual environments enhances the risk. The problem with lack of accountability due to use of shared accounts and passwords, little separation of duties and principle of “least privilege” not being followed is a massive occurrence in the use of virtual environments. Privileged identities are classified into groups of malicious insiders. They are involved in IP theft, espionage, fraud and IT sabotage. Along with the argumentative idea of the technical approach towards the solution of the problem, other mentioned issues will be processed, because Insider threat is a people-centric issue. People are complex beings, hence the approach to a solution must be versatile. Attention will be given to the positive practices of Identity based security, host based security, end-to-end security and compliance for cloud and virtual environments. Likewise, we will observe the negative practices and possible approaches to the problem of organizational factors contributing to insider attacks, with the aim to introduce environment where being an insider is not easy.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">154</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">160</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">10.15308/Sinteza-2016-154-160</dim:field>
                    <dim:field mdschema="dc" element="source">Proceedings</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
