{"id":2288,"date":"2023-04-11T12:50:34","date_gmt":"2023-04-11T10:50:34","guid":{"rendered":"https:\/\/wiweb.org\/sr\/?p=2288"},"modified":"2023-05-11T12:46:10","modified_gmt":"2023-05-11T10:46:10","slug":"garancija-bezbednosti-u-fintech-diskusija-o-merama-bezbednosti-i-prevenciji-prevara","status":"publish","type":"post","link":"https:\/\/wiweb.org\/sr\/%d1%84%d0%b8%d0%bd%d1%82%d0%b5%d1%85\/garancija-bezbednosti-u-fintech-diskusija-o-merama-bezbednosti-i-prevenciji-prevara\/","title":{"rendered":"Garancija bezbednosti u Fintech: Diskusija o merama bezbednosti i prevenciji prevara."},"content":{"rendered":"<p>Sa kao \u0161to finansijska tehnologija (finteh) nastavlja da revolucioni\u0161e finansijsku industriju, potreba za ja\u010dim bezbednosnim merama postaje sve ve\u0107a. Finteh kompanije posluju u digitalnom okru\u017eenju gde je valuta podaci, a samo jedno kr\u0161enje podataka mo\u017ee imati katastrofalne posledice. U \u010dlanku su obra\u0111ene bezbednosne mere koje finteh kompanije primenjuju da bi obezbedile finansijske transakcije, zna\u010daj bezbednosnih mera i na\u010dini prevencije prevara u finteh industriji.<\/p><h2 class=\"wp-block-heading\">\u0421\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u043d\u0430 \u043c\u0435\u0440\u0430 \u043a\u043e\u0458\u0435 \u0441\u0435 \u043f\u0440\u0438\u043c\u0435\u045a\u0443\u0458\u0443 \u0443 \u0424\u0438\u043d\u0442\u0435\u0445-\u0443<\/h2><p>\u0418\u0441\u043f\u043e\u0434 \u043f\u0440\u0438\u043a\u0430\u0436\u0443\u0458\u0435\u043c\u043e \u043d\u0430\u0458\u0447\u0435\u0448\u045b\u0435 \u043c\u0435\u0440\u0435 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u0458\u0435 \u0441\u0435 \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0443 \u0444\u0438\u043d\u0442\u0435\u0445\u0443 \u0438 \u043d\u0430\u0447\u0438\u043d \u043d\u0430 \u043a\u043e\u0458\u0438 \u043e\u043d\u0438 \u043e\u0441\u0438\u0433\u0443\u0440\u0430\u0432\u0430\u0458\u0443 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0458\u0441\u043a\u0438\u0445 \u043a\u043e\u0440\u0438\u0441\u043d\u0438\u043a\u0430.<\/p><h3 class=\"wp-block-heading\">\u0428\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0435.<\/h3><p>\u0428\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0435 \u0458\u0435 \u043f\u0440\u043e\u0446\u0435\u0441 \u0442\u0440\u0430\u043d\u0441\u0444\u043e\u0440\u043c\u0438\u0441\u0430\u045a\u0430 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430 \u0443 \u043a\u043e\u0434 \u043a\u043e\u0458\u0438 \u043c\u043e\u0436\u0435 \u0434\u0430 \u0441\u0435 \u043f\u0440\u043e\u0447\u0438\u0442\u0430 \u0441\u0430\u043c\u043e \u043e\u0434 \u043e\u0432\u043b\u0430\u0448\u045b\u0435\u043d\u0438\u0445 \u043b\u0438\u0446\u0430. \u0424\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0435 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0443 \u043e\u0441\u0435\u0442\u0459\u0438\u0432\u0438\u0445 \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0458\u0441\u043a\u0438\u0445 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430, \u043a\u0430\u043e \u0448\u0442\u043e \u0441\u0443 \u043b\u043e\u0437\u0438\u043d\u043a\u0435, \u0431\u0440\u043e\u0458\u0435\u0432\u0438 \u043a\u0440\u0435\u0434\u0438\u0442\u043d\u0438\u0445 \u043a\u0430\u0440\u0442\u0438\u0446\u0430 \u0438 \u0434\u0435\u0442\u0430\u0459\u0438 \u0431\u0430\u043d\u043a\u043e\u0432\u043d\u043e\u0433 \u0440\u0430\u0447\u0443\u043d\u0430. \u0410\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0430 \u0442\u0440\u0430\u043d\u0441\u0444\u043e\u0440\u043c\u0438\u0448\u0443 \u043e\u0432\u0435 \u043f\u043e\u0434\u0430\u0442\u043a\u0435 \u0443 \u043a\u043e\u0434 \u043a\u043e\u0458\u0438 \u043c\u043e\u0436\u0435 \u0434\u0430 \u0441\u0435 \u0434\u0435\u0448\u0438\u0444\u0440\u0443\u0458\u0435 \u0441\u0430\u043c\u043e \u043e\u0434 \u0441\u0442\u0440\u0430\u043d\u0435 \u043e\u0432\u043b\u0430\u0448\u045b\u0435\u043d\u0438\u0445 \u043b\u0438\u0446\u0430 \u043a\u043e\u0458\u0438 \u0438\u043c\u0430\u0458\u0443 \u043e\u0434\u0440\u0435\u0452\u0435\u043d\u0438 \u043a\u0459\u0443\u0447.<\/p><p>\u0414\u043e\u0434\u0430\u0442\u043d\u043e, \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0438 \u0437\u0430 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0435 \u043a\u043e\u0458\u0438 \u0441\u0435 \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0443 \u0444\u0438\u043d\u0442\u0435\u0445-\u0443 \u0447\u0435\u0441\u0442\u043e \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u043c\u043d\u043e\u0433\u043e \u0441\u043b\u043e\u0458\u0435\u0432\u0430 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0430 \u0434\u0430 \u0431\u0438 \u043e\u0431\u0435\u0437\u0431\u0435\u0434\u0438\u043b\u0438 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430. \u0422\u043e \u043e\u043c\u043e\u0433\u0443\u045b\u0430\u0432\u0430 \u0434\u0430, \u0447\u0430\u043a \u0430\u043a\u043e \u0441\u0435 \u0458\u0435\u0434\u0430\u043d \u0441\u043b\u043e\u0458 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0430 \u043f\u0440\u0435\u043a\u0440\u0448\u0438, \u043f\u043e\u0434\u0430\u0446\u0438 \u045b\u0435 \u0438 \u0434\u0430\u0459\u0435 \u0431\u0438\u0442\u0438 \u0437\u0430\u0448\u0442\u0438\u045b\u0435\u043d\u0438 \u043e\u0441\u0442\u0430\u043b\u0438\u043c \u0441\u043b\u043e\u0458\u0435\u0432\u0438\u043c\u0430.<\/p><h3 class=\"wp-block-heading\">\u0414\u0432\u043e\u0444\u0430\u043a\u0442\u043e\u0440\u0441\u043a\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0458\u0430<\/h3><p>Dvostruki faktori autentifikacije (2FA) je bezbednosna mera koja zahteva od korisnika da unese dve forme identifikacije da bi dobio pristup svojim nalozima. To mo\u017ee da uklju\u010duje lozinku i jednokratni kod koji je poslat na mobilni ure\u0111aj ili e-mail adresu korisnika.<\/p><p>2FA je efikasan na\u010din da se spre\u010di neovla\u0161\u0107eni pristup nalogima korisnika jer zahteva od korisnika da poseduje i ne\u0161to \u0161to zna (lozinku) i ne\u0161to \u0161to poseduje (mobilni ure\u0111aj ili e-mail adresu) da bi dobio pristup svojem nalogu. Ovo dodaje dodatnu za\u0161titnu sloju \u0161to \u010dini mnogo te\u017eim za hakerima da pristupe nalozima korisnika.<\/p><h3 class=\"wp-block-heading\">\u0431\u0438\u043e\u043c\u0435\u0442\u0440\u0438\u0458\u0441\u043a\u043e \u043f\u043e\u0442\u0432\u0440\u0452\u0438\u0432\u0430\u045a\u0435<\/h3><p>\u0411\u0438\u043e\u043c\u0435\u0442\u0440\u0438\u0458\u0441\u043a\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u0430 \u0438\u0441\u043a\u043e\u0440\u0438\u0441\u0442\u0438 \u043f\u0440\u0438\u0440\u043e\u0434\u043d\u0435 \u043e\u0441\u043e\u0431\u0438\u043d\u0435, \u043a\u0430\u043e \u0448\u0442\u043e \u0441\u0443 \u043e\u0442\u0438\u0441\u0446\u0438 \u043f\u0440\u0441\u0442\u0438\u045b\u0430, \u043f\u0440\u0435\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u045a\u0435 \u043b\u0438\u0446\u0430 \u0438\u043b\u0438 \u043f\u0440\u0435\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u045a\u0435 \u0433\u043b\u0430\u0441\u0430, \u0434\u0430 \u0431\u0438 \u0441\u0435 \u043f\u043e\u0442\u0432\u0440\u0434\u0438\u043b\u0438 \u043a\u043e\u0440\u0438\u0441\u043d\u0438\u0446\u0438. \u041e\u0432\u043e \u0458\u0435 \u0441\u0432\u0435 \u0432\u0438\u0448\u0435 \u043f\u043e\u043f\u0443\u043b\u0430\u0440\u043d\u0430 \u043c\u0435\u0442\u043e\u0434\u0430 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438 \u0443 \u0444\u0438\u043d\u0442\u0435\u043a\u0443, \u0458\u0435\u0440 \u0458\u0435 \u0442\u0435\u0448\u043a\u043e \u043f\u0440\u0435\u0432\u0430\u0440\u0438\u0442\u0438 \u0438\u043b\u0438 \u043a\u0440\u0430\u0434\u0435\u0442\u0438 \u0431\u0438\u043e\u043c\u0435\u0442\u0440\u0438\u0458\u0441\u043a\u0435 \u043f\u043e\u0434\u0430\u0442\u043a\u0435.<\/p><p>\u041c\u043d\u043e\u0433\u0435 \u043c\u043e\u0431\u0438\u043b\u043d\u0435 \u0431\u0430\u043d\u043a\u0430\u0440\u0441\u043a\u0435 \u0430\u043f\u043b\u0438\u043a\u0430\u0446\u0438\u0458\u0435 \u0441\u0430\u0434\u0430 \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0431\u0438\u043e\u043c\u0435\u0442\u0440\u0438\u0458\u0441\u043a\u043e \u043f\u043e\u0442\u0432\u0440\u0452\u0438\u0432\u0430\u045a\u0435 \u0437\u0430 \u0432\u0435\u0440\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0458\u0443 \u0438\u0434\u0435\u043d\u0442\u0438\u0442\u0435\u0442\u0430 \u043a\u043e\u0440\u0438\u0441\u043d\u0438\u043a\u0430. \u041d\u0430 \u043f\u0440\u0438\u043c\u0435\u0440, \u043d\u0435\u043a\u0435 \u0430\u043f\u043b\u0438\u043a\u0430\u0446\u0438\u0458\u0435 \u043e\u043c\u043e\u0433\u0443\u045b\u0430\u0432\u0430\u0458\u0443 \u043a\u043e\u0440\u0438\u0441\u043d\u0438\u0446\u0438\u043c\u0430 \u0434\u0430 \u0441\u0435 \u043f\u0440\u0438\u0458\u0430\u0432\u0435 \u043f\u043e\u043c\u043e\u045b\u0443 \u043e\u0442\u0438\u0441\u043a\u0430 \u043f\u0440\u0441\u0442\u0430 \u0438\u043b\u0438 \u043f\u0440\u0435\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u045a\u0430 \u043b\u0438\u0446\u0430, \u0448\u0442\u043e \u043e\u043c\u043e\u0433\u0443\u045b\u0430\u0432\u0430 \u0431\u0440\u0437 \u0438 \u043b\u0430\u043a \u043f\u0440\u0438\u0441\u0442\u0443\u043f \u045a\u0438\u0445\u043e\u0432\u043e\u043c \u043d\u0430\u043b\u043e\u0433\u0443 \u0441\u0430 \u0432\u0438\u0441\u043e\u043a\u0438\u043c \u043d\u0438\u0432\u043e\u043e\u043c \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438.<\/p><h3 class=\"wp-block-heading\">\u0422\u043e\u043a\u0435\u043d\u0438\u0437\u0430\u0446\u0438\u0458\u0430<\/h3><p>Tokenizacija je proces zamene osjetljivih financijskih podataka, kao \u0161to su brojevi kreditnih kartica, tokenom ili nasumi\u010dno generisanim nizom znakova. Ovaj token se koristi umjesto stvarnih financijskih podataka tijekom transakcija, \u0161to \u010dini mnogo te\u017eim za hakere da preuzmu i ukradu podatke korisnika.<\/p><p>Tokenizacija je efikasan na\u010din za\u0161tite osjetljivih finansijskih podataka, jer obezbje\u0111uje da stvarni podaci nikada ne budu prenijeti tokom transakcije. \u010cak i ako haker uspije da preuzme token, on \u0107e mu biti beskoristan jer se ne mo\u017ee koristiti za izvr\u0161avanje prevara.<\/p><h3 class=\"wp-block-heading\">Nadzor za prevare<\/h3><p>Tokenizacija je proces zamene osetljivih finansijskih podataka, kao \u0161to su brojevi kreditnih kartica, tokenom ili slu\u010dajno generisanim nizom znakova. Ovaj token se koristi umesto stvarnih finansijskih podataka tokom transakcije, \u0161to olak\u0161ava hakerima da uhvate i ukradu podatke korisnika.<\/p><p>Tokenizacija je efikasan na\u010din za\u0161tite osjetljivih finansijskih podataka, jer obezbje\u0111uje da stvarni podaci nikad ne budu preneseni tokom transakcije. \u010cak i ako haker uspije da uhvati token, on \u0107e za njega biti beskoristan, jer se ne mo\u017ee koristiti za izvr\u0161avanje la\u017enih transakcija.<\/p><h3 class=\"wp-block-heading\">\u0420\u0435\u0434\u043e\u0432\u043d\u0430 \u0430\u0436\u0443\u0440\u0438\u0440\u0430\u045a\u0430 \u0441\u043e\u0444\u0442\u0432\u0435\u0440\u0430<\/h3><p>\u0420\u0435\u0434\u043e\u0432\u043d\u0430 \u0430\u0436\u0443\u0440\u0438\u0440\u0430\u045a\u0430 \u0441\u043e\u0444\u0442\u0432\u0435\u0440\u0430 \u0441\u0443 \u043d\u0435\u043e\u043f\u0445\u043e\u0434\u043d\u0430 \u0437\u0430 \u043e\u0434\u0440\u0436\u0430\u0432\u0430\u045a\u0435 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438 \u0430\u043f\u043b\u0438\u043a\u0430\u0446\u0438\u0458\u0430 \u0444\u0438\u043d\u0442\u0435\u0445-\u0430. \u041e\u0432\u0430 \u0430\u0436\u0443\u0440\u0438\u0440\u0430\u045a\u0430 \u0447\u0435\u0441\u0442\u043e \u0441\u0430\u0434\u0440\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043a\u0435 \u0433\u0440\u0435\u0448\u0430\u043a\u0430 \u0438 \u0437\u0430\u043a\u0440\u043f\u0435 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u0458\u0435 \u0443\u043a\u043b\u0430\u045a\u0430\u0458\u0443 \u0443\u0440\u0435\u0434\u043d\u043e\u0441\u0442\u0438 \u0443 \u0441\u043e\u0444\u0442\u0432\u0435\u0440\u0443.<\/p><p>Fintech kompanije obi\u010dno redovno izdaju a\u017euriranja kako bi obezbedile da njihove aplikacije ostanu bezbedne i a\u017eurne sa najnovijim bezbednosnim merama. Va\u017eno je da korisnici instaliraju ova a\u017euriranja \u0161to je pre mogu\u0107e nakon njihovog objavljivanja, kako bi obezbedili kontinuiranu bezbednost njihovih finansijskih podataka.<\/p><p>Finteh kompanije koriste razli\u010dite bezbednosne mere da bi za\u0161titile osjetljive finansijske podatke korisnika. Ove mere uklju\u010duju enkripciju, dvostruko potvr\u0111ivanje, biometrijsko potvr\u0111ivanje, tokenizaciju, prac\u0301enje prevara i redovno a\u017euriranje softvera. Kori\u0161c\u0301enjem ovih bezbednosnih mera, finteh kompanije mogu da obezbede korisnicima bezbedan i pogodan na\u010din upravljanja njihovim finansijama.<\/p><p>Ipak, va\u017eno je i da korisnici preduzmu korake da za\u0161tite svoje finansijske informacije. To uklju\u010duje kori\u0161\u0107enje jakih jakih i jedinstvenih lozinki, uklju\u010divanje dvostrukog proveravanja identiteta, ako je dostupno, i redovno pra\u0107enje svojih ra\u010duna u potrazi za sumnjivom aktivno\u0161\u0107u.<\/p><p>Korisnici treba da budu oprezni kada dele svoje finansijske informacije online i da ih dele samo renomiranim fintech kompanijama sa dokumentovanim uspehom u oblasti bezbednosti.<\/p><p>Dok god finteh omogu\u0107ava upravljanje finansijama na lak\u0161i na\u010din nego ikada ranije, bitno je da i firme i korisnici prvenstveno posve\u0107uju pa\u017enju bezbednosnim merama da se za\u0161tite od potencijalnih pretnji i obezbede kontinuirani rast i uspeh u finteh industriji.<\/p><h2 class=\"wp-block-heading\">\u0417\u043d\u0430\u0447\u0430\u0458 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u043d\u0438\u0445 \u043c\u0435\u0440\u0430 \u0443 \u0424\u0438\u043d\u0442\u0435\u0445\u0443.<\/h2><p>\u0417\u043d\u0430\u0447\u0430\u0458 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u043d\u0438\u0445 \u043c\u0435\u0440\u0430 \u0443 \u0444\u0438\u043d\u0442\u0435\u0445\u0443 \u043d\u0435 \u043c\u043e\u0436\u0435 \u0434\u0430 \u0441\u0435 \u043f\u0440\u0435\u0446\u0435\u043d\u0438. \u0424\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u0441\u0435 \u0431\u0430\u0432\u0435 \u043e\u0441\u0435\u0442\u0459\u0438\u0432\u0438\u043c \u043f\u043e\u0434\u0430\u0446\u0438\u043c\u0430 \u043a\u043b\u0438\u0458\u0435\u043d\u0430\u0442\u0430, \u0430 \u0458\u0435\u0434\u043d\u043e \u043a\u0440\u0448\u0435\u045a\u0435 \u043e\u0432\u0438\u0445 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430 \u043c\u043e\u0436\u0435 \u0434\u0430 \u0438\u043c\u0430 \u043e\u0437\u0431\u0438\u0459\u043d\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u0438\u0446\u0435. \u041a\u0440\u0448\u0435\u045a\u0435 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430 \u043c\u043e\u0436\u0435 \u0434\u0430 \u0434\u043e\u0432\u0435\u0434\u0435 \u0434\u043e \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0458\u0441\u043a\u0438\u0445 \u0433\u0443\u0431\u0438\u0442\u0430\u043a\u0430 \u0437\u0430 \u043a\u043b\u0438\u0458\u0435\u043d\u0442\u0435, \u043e\u0448\u0442\u0435\u0442\u0435 \u0443 \u0440\u0435\u043f\u0443\u0442\u0430\u0446\u0438\u0458\u0438 \u0444\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u0438 \u043f\u0440\u0430\u0432\u043d\u0438\u0445 \u043f\u043e\u0441\u043b\u0435\u0434\u0438\u0446\u0430 \u0437\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0443.<\/p><p>Finteh kompanije koje prioritetno posve\u0107uju bezbednost, bi\u0107e vi\u0161e sklonije da privuku i odr\u017ee klijente. Klijenti \u017eele da znaju da su njihovi podaci i finansijske transakcije bezbedni, i bi\u0107e vi\u0161e skloni da veruju kompaniji koja ulagati u jake bezbednosne mere.<\/p><p>Pored za\u0161tite podataka klijenata, bezbednosne mere u fintecu tako\u0111e poma\u017eu u spre\u010davanju prevara i ciberneti\u010dkih napada. Fintec kompanije su glavni cilj za ciberneti\u010dke prevare zbog vrednih finansijskih informacija kojima se bave. Uvo\u0111enje jakih bezbednosnih mera mo\u017ee pomo\u0107i u odvra\u0107anju ciberneti\u010dkih prevara i spre\u010davanju pristupa osetljivim informacijama.<\/p><p>Fintech kompanije bi trebalo da uvedu niz mera bezbednosti, kao \u0161to su vi\u0161estruka autentifikacija, enkripcija i redovna bezbednosna revizija. Vi\u0161estruka autentifikacija dodaje dodatnu za\u0161titu, zahtevaju\u0107i od korisnika da unesu vi\u0161e od jednog oblika identifikacije da bi pristupili svojim nalozima. Enkripcija obezbe\u0111uje da podaci koji se razmenjuju izme\u0111u korisnika i fintech kompanije budu bezbedni i da ne mogu da budu preuzeti od strane neovla\u0161\u0107enih tre\u0107ih lica. Redovne bezbednosne revizije mogu pomo\u0107i u identifikovanju ranjivosti i osigurati da su bezbednosne mere a\u017eurne i efikasne.<\/p><p>\u0417\u0430\u043a\u0459\u0443\u0447\u0443\u0458\u0443\u045b\u0438, \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u043d\u0430 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0441\u0443 \u043d\u0435\u043e\u043f\u0445\u043e\u0434\u043d\u0430 \u0437\u0430 \u0444\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u0434\u0430 \u0431\u0438 \u0437\u0430\u0448\u0442\u0438\u0442\u0438\u043b\u0435 \u043f\u043e\u0434\u0430\u0442\u043a\u0435 \u043a\u043b\u0438\u0458\u0435\u043d\u0430\u0442\u0430, \u0441\u043f\u0440\u0435\u0447\u0438\u043b\u0435 \u043f\u0440\u0435\u0432\u0430\u0440\u0435 \u0438 \u043a\u0438\u0431\u0435\u0440 \u043d\u0430\u043f\u0430\u0434\u0435 \u0438 \u043e\u0434\u0440\u0436\u0430\u043b\u0435 \u043f\u043e\u0432\u0435\u0440\u0435\u045a\u0435 \u043a\u043b\u0438\u0458\u0435\u043d\u0430\u0442\u0430. \u0424\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u0442\u0440\u0435\u0431\u0430 \u0434\u0430 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u043e \u0440\u0430\u0437\u043c\u0430\u0442\u0440\u0430\u0458\u0443 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u043d\u0430 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0438 \u0440\u0435\u0434\u043e\u0432\u043d\u043e \u0438\u0445 \u043f\u0440\u0435\u0433\u043b\u0435\u0434\u0430\u0458\u0443 \u0438 \u0430\u0436\u0443\u0440\u0438\u0440\u0430\u0458\u0443 \u0434\u0430 \u0431\u0438 \u043e\u0441\u0438\u0433\u0443\u0440\u0430\u043b\u0438 \u045a\u0438\u0445\u043e\u0432\u0443 \u0435\u0444\u0438\u043a\u0430\u0441\u043d\u043e\u0441\u0442 \u0443 \u043b\u0438\u0446\u0443 \u0435\u0432\u043e\u043b\u0443\u0438\u0440\u0430\u0458\u0443\u045b\u0438\u0445 \u043f\u0440\u0435\u0442\u045a\u0438.<\/p><h2 class=\"wp-block-heading\">Spre\u010davanje prevara u finteku.<\/h2><p>\u0424\u0438\u043d\u0442\u0435\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0458\u0430, \u0438\u043b\u0438 \u0424\u0438\u043d\u0442\u0435\u0445, \u0458\u0435 \u0431\u0440\u0437\u043e \u043f\u0440\u043e\u043c\u0435\u043d\u0438\u043b\u0430 \u043d\u0430\u0447\u0438\u043d \u043d\u0430 \u043a\u043e\u0458\u0438 \u0441\u0435 \u0432\u0440\u0448\u0435 \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0458\u0441\u043a\u0435 \u0442\u0440\u0430\u043d\u0441\u0430\u043a\u0446\u0438\u0458\u0435. \u0417\u0430\u0458\u0435\u0434\u043d\u043e \u0441\u0430 \u0440\u0430\u0441\u0442\u043e\u043c \u0446\u0438\u0433\u0440\u0438\u043b\u043d\u0438\u0445 \u043f\u043b\u0430\u045b\u0430\u045a\u0430, \u043c\u043e\u0431\u0438\u043b\u043d\u0435 \u0431\u0430\u043d\u043a\u0430\u0440\u0441\u0442\u0432\u0430 \u0438 \u043e\u043d\u043b\u0430\u0458\u043d \u0442\u0440\u0433\u043e\u0432\u0438\u043d\u0435, \u0444\u0438\u043d\u0442\u0435\u0445 \u0458\u0435 \u0443\u0447\u0438\u043d\u0438\u043e \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0458\u0441\u043a\u0435 \u0443\u0441\u043b\u0443\u0433\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0438\u0458\u0438\u043c, \u0443\u0434\u043e\u0431\u043d\u0438\u0458\u0438\u043c \u0438 \u0438\u0441\u043f\u043b\u0430\u0442\u0459\u0438\u0432\u0438\u0458\u0438\u043c. \u041c\u0435\u0452\u0443\u0442\u0438\u043c, \u043e\u0432\u0430 \u0443\u0434\u043e\u0431\u043d\u043e\u0441\u0442 \u0438\u043c\u0430 \u0441\u0432\u043e\u0458\u0443 \u0446\u0435\u043d\u0443: \u0440\u0438\u0437\u0438\u043a \u043e\u0434 \u043e\u0441\u0438\u0433\u0443\u0440\u0430\u045a\u0430. \u041e\u0441\u0438\u0433\u0443\u0440\u0430\u0447\u0438 \u043a\u043e\u043d\u0441\u0442\u0430\u043d\u0442\u043d\u043e \u0442\u0440\u0430\u0436\u0435 \u043d\u0430\u0447\u0438\u043d\u0435 \u0434\u0430 \u0438\u0441\u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0441\u043b\u0430\u0431\u043e\u0441\u0442\u0438 \u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0438\u043c\u0430 \u0444\u0438\u043d\u0442\u0435\u0445\u0430 \u0438 \u043e\u0442\u043a\u0440\u0430\u0434\u0430\u045a\u0435 \u043d\u043e\u0432\u0446\u0430 \u0438\u043b\u0438 \u043e\u0441\u0435\u0442\u0459\u0438\u0432\u0438\u0445 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0458\u0430 \u043e\u0434 \u043d\u0435\u0443\u043f\u043e\u0437\u043d\u0430\u0442\u0438\u0445 \u043a\u043e\u0440\u0438\u0441\u043d\u0438\u043a\u0430. \u0417\u0430\u0442\u043e \u0458\u0435 \u0441\u043f\u0440\u0435\u0447\u0430\u0432\u0430\u045a\u0435 \u043e\u0441\u0438\u0433\u0443\u0440\u0430\u045a\u0430 \u0443 \u0444\u0438\u043d\u0442\u0435\u0445\u0443 \u0438\u0437\u0443\u0437\u0435\u0442\u043d\u043e \u0432\u0430\u0436\u043d\u043e \u0437\u0430 \u0440\u0430\u0437\u0432\u043e\u0458 \u0438 \u043e\u0434\u0440\u0436\u0438\u0432\u043e\u0441\u0442 \u0438\u043d\u0434\u0443\u0441\u0442\u0440\u0438\u0458\u0435. \u0423 \u043e\u0432\u043e\u043c \u0447\u043b\u0430\u043d\u043a\u0443 \u045b\u0435\u043c\u043e \u0440\u0430\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u0438 \u043e \u043d\u0435\u043a\u0438\u043c \u043e\u0434 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0438\u0458\u0430 \u043a\u043e\u0458\u0435 \u0444\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u043c\u043e\u0433\u0443 \u0434\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u0435 \u0434\u0430 \u0431\u0438 \u0441\u043f\u0440\u0435\u0447\u0438\u043b\u0435 \u043e\u0441\u0438\u0433\u0443\u0440\u0430\u045a\u0430.<\/p><h3 class=\"wp-block-heading\">\u0408\u0430\u043a\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0438 \u043f\u043e\u0442\u0432\u0440\u0434\u0435 \u0438 \u0430\u0443\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0458\u0435<\/h3><p>Finteh kompanije moraju da implementiraju \u010dvrste procese autentifikacije i autorizacije kako bi spre\u010dile neautorizovani pristup korisni\u010dkim nalozima. \u010cvrsta \u0161ifra, vi\u0161estruka autentifikacija, biometrijska verifikacija i automatsko odjavljivanje sa sesije su neke od zajedni\u010dkih sredstava koje finteh kompanije mogu da koriste za verifikaciju identiteta korisnika. Osim toga, finteh kompanije treba da koriste autentifikaciju baziranu na riziku koja procenjuje nivo rizika za svaku transakciju i primenjuje odgovaraju\u0107e sredstva autentifikacije.<\/p><h3 class=\"wp-block-heading\">\u0428\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0435 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430<\/h3><p>Finteh kompanije moraju da koriste ja\u010de algoritme \u0161ifrovanja za za\u0161titu korisni\u010dkih podataka, uklju\u010duju\u0107i li\u010dne podatke, transakcijske podatke i finansijske informacije. \u0160ifrovanje podataka onemogu\u0107ava neautorizovan pristup osjetljivim podacima, \u010dak i ako su podaci ukradeni ili preuzeti tokom prenosa. Osim toga, finteh kompanije bi trebale da koriste i sigurne protokole komunikacije, kao \u0161to su HTTPS, SSL ili TLS, da bi obezbedile sigurnu transmisiju podataka preko interneta.<\/p><h3 class=\"wp-block-heading\">Kontinuirano pra\u0107enje i otkrivanje<\/h3><p>\u0424\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u043c\u043e\u0440\u0430\u0458\u0443 \u043a\u043e\u043d\u0441\u0442\u0430\u043d\u0442\u043d\u043e \u0434\u0430 \u043d\u0430\u0434\u0433\u043b\u0435\u0434\u0430\u0458\u0443 \u0441\u0432\u043e\u0458\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0443 \u0432\u0435\u0437\u0438 \u0441\u0430 \u043d\u0435\u043e\u0431\u0438\u0447\u043d\u0438\u043c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438\u043c\u0430, \u043a\u0430\u043e \u0448\u0442\u043e \u0441\u0443 \u0441\u0443\u043c\u045a\u0438\u0432\u0430 \u043f\u0440\u0438\u0458\u0430\u0432\u0459\u0438\u0432\u0430\u045a\u0430, \u043d\u0435\u0443\u043e\u0431\u0438\u0447\u0430\u0458\u0435\u043d\u0438 \u0432\u0440\u0441\u0442\u0435 \u0442\u0440\u0430\u043d\u0441\u0430\u043a\u0446\u0438\u0458\u0430 \u0438\u043b\u0438 \u043f\u0440\u043e\u043c\u0435\u043d\u0435 \u0443 \u043f\u043e\u043d\u0430\u0448\u0430\u045a\u0443 \u043a\u043e\u0440\u0438\u0441\u043d\u0438\u043a\u0430. \u041d\u0430\u0434\u0433\u043b\u0435\u0434\u0430\u045a\u0435 \u0438 \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u045a\u0435 \u0443 \u0440\u0435\u0430\u043b\u043d\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0443 \u043e\u043c\u043e\u0433\u0443\u045b\u0430\u0432\u0430 \u0444\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0430\u043c\u0430 \u0434\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0443\u0458\u0443 \u0438 \u0431\u0440\u0437\u043e \u0440\u0435\u0430\u0433\u0443\u0458\u0443 \u043d\u0430 \u043f\u0440\u0435\u0432\u0430\u0440\u0435. \u041f\u043e\u0440\u0435\u0434 \u0442\u043e\u0433\u0430, \u0444\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u0442\u0440\u0435\u0431\u0430 \u0434\u0430 \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0438 \u043c\u0430\u0448\u0438\u043d\u0441\u043a\u043e \u0443\u0447\u0435\u045a\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u0430\u043c\u0430 \u043a\u043e\u0458\u0438 \u043c\u043e\u0433\u0443 \u0434\u0430 \u043e\u0442\u043a\u0440\u0438\u0458\u0443 \u0432\u0440\u0441\u0442\u0435 \u0438 \u0430\u043d\u043e\u043c\u0430\u043b\u0438\u0458\u0435 \u0443 \u043f\u043e\u0434\u0430\u0446\u0438\u043c\u0430 \u043a\u043e\u0458\u0438 \u043c\u043e\u0433\u0443 \u0434\u0430 \u0443\u043a\u0430\u0436\u0443 \u043d\u0430 \u043e\u0431\u043c\u0430\u043d\u0443.<\/p><h3 class=\"wp-block-heading\">\u0410\u043d\u0442\u0438\u0444\u0440\u0430\u0443\u0434 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0438 \u0440\u0435\u0448\u0435\u045a\u0430<\/h3><p>Fintech kompanije treba da koriste alatke i re\u0161enja za suzbijanje prevare, koja mogu da detektuju i spre\u010de prevare. Ovi alatki mogu da obuhvataju analizu prevare, verifikaciju identiteta, identifikaciju ure\u0111aja, pra\u0107enje transakcija i detektovanje anomalija. Osim toga, fintech kompanije treba da koriste i spoljne usluge za detekciju prevara, koje mogu da pru\u017ee upozorenja i savete u realnom vremenu.<\/p><h3 class=\"wp-block-heading\">\u041e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u045a\u0435 \u0438 \u0441\u0432\u0435\u0441\u0442 \u043a\u043b\u0438\u0458\u0435\u043d\u0430\u0442\u0430<\/h3><p>Finteh kompanije treba da edukuju svoje klijente o riziku od prevara i kako da se za\u0161tite od prevaranta. To mo\u017ee da uklju\u010di davanje saveta za kreiranje jakih lozinki, izbegavanje phishinga i prijavljivanje sumnjivih aktivnosti. Osim toga, finteh kompanije treba da redovno a\u017euriraju informacije o najnovijim trendovima u vezi sa prevarantima i na\u010dinima da se ostane bezbedan na mre\u017ei.<\/p><h3 class=\"wp-block-heading\">\u0423\u0441\u043a\u043b\u0430\u0452\u0435\u043d\u043e\u0441\u0442 \u0441\u0430 \u043f\u0440\u043e\u043f\u0438\u0441\u0438\u043c\u0430<\/h3><p>Finteh kompanije moraju da po\u0161tuju zahteve regulatornih odredbi za spre\u010davanje prevara i upravljanje rizikom. Ovo mo\u017ee da uklju\u010duje procedure za verifikaciju identiteta klijenta, procedura za poznavanje klijenta (KYC), politike protiv pranja novca (AML) i propise za za\u0161titu podataka. Finteh kompanije koje ne po\u0161tuju ove zahteve mogu da snose stroge kazne i reputacionu \u0161tetu.<\/p><p>\u0421\u043f\u0440\u0435\u0447\u0430\u0432\u0430\u045a\u0435 \u043f\u0440\u0435\u0432\u0430\u0440\u0430 \u0443 \u0444\u0438\u043d\u0442\u0435\u0445\u0443 \u0437\u0430\u0445\u0442\u0435\u0432\u0430 \u0432\u0438\u0448\u0435\u0441\u043b\u043e\u0458\u043d\u043e \u043f\u0440\u0438\u0441\u0442\u0443\u043f, \u043a\u043e\u0458\u0438 \u0443\u043a\u0459\u0443\u0447\u0443\u0458\u0435 \u0458\u0430\u043a\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0435 \u0437\u0430 \u043f\u043e\u0442\u0432\u0440\u0434\u0443 \u0438 \u0430\u0443\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0458\u0443, \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u045a\u0435 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430, \u043f\u043e\u0441\u0442\u043e\u0458\u0430\u043d\u043e \u043d\u0430\u0434\u0437\u043e\u0440 \u0438 \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u045a\u0435, \u0430\u043b\u0430\u0442\u0435 \u0438 \u0430\u043d\u0442\u0438\u0444\u0440\u0430\u0443\u0434 \u0440\u0435\u0448\u0435\u045a\u0430, \u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u045a\u0435 \u0438 \u0441\u0432\u0435\u0441\u0442 \u043a\u043b\u0438\u0458\u0435\u043d\u0442\u0430 \u0438 \u0443\u0441\u043a\u043b\u0430\u0452\u0438\u0432\u0430\u045a\u0435 \u0441\u0430 \u0440\u0435\u0433\u0443\u043b\u0430\u0446\u0438\u0458\u0430\u043c\u0430. \u0424\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u043a\u043e\u0458\u0435 \u043f\u0440\u0438\u043c\u0435\u045b\u0443 \u043e\u0432\u0435 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0438\u0458\u0435 \u043d\u0435 \u0441\u0430\u043c\u043e \u0448\u0442\u0438\u0442\u0435 \u0441\u0432\u043e\u0458\u0435 \u043a\u043e\u0440\u0438\u0441\u043d\u0438\u043a\u0435 \u043e\u0434 \u043f\u0440\u0435\u0432\u0430\u0440\u0430, \u0432\u0435\u045b \u0438 \u0433\u0440\u0430\u0434\u0435 \u043f\u043e\u0443\u0437\u0434\u0430\u043d\u043e\u0441\u0442 \u0438 \u0432\u0435\u0440\u043d\u043e\u0441\u0442 \u0441\u0432\u043e\u0458\u043e\u0458 \u043c\u0430\u0440\u0446\u0438. \u0411\u043e\u0440\u0431\u0430 \u043f\u0440\u043e\u0442\u0438\u0432 \u043f\u0440\u0435\u0432\u0430\u0440\u0430 \u0443 \u0444\u0438\u043d\u0442\u0435\u0445\u0443 \u0458\u0435 \u043d\u0435\u043f\u0440\u0435\u0441\u0442\u0430\u043d\u0430, \u0430 \u0444\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u043c\u043e\u0440\u0430\u0458\u0443 \u0434\u0430 \u0431\u0443\u0434\u0443 \u043f\u0430\u0436\u0459\u0438\u0432\u0438 \u0438 \u0430\u0434\u0430\u043f\u0442\u0438\u0432\u043d\u0438 \u0434\u0430 \u0431\u0438 \u0431\u0438\u043b\u0438 \u043a\u043e\u0440\u0430\u043a \u0438\u0441\u043f\u0440\u0435\u0434 \u043f\u0440\u0435\u0432\u0430\u0440\u0430\u0447\u0430.<\/p><h2 class=\"wp-block-heading\">\u0417\u0430\u043a\u0459\u0443\u0447\u0430\u043a<\/h2><p>\u0417\u0430\u043a\u0459\u0443\u0447\u043d\u043e, \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442 \u0458\u0435 \u0438 \u0442\u0440\u0435\u0431\u0430 \u0434\u0430 \u0431\u0443\u0434\u0435 \u043d\u0430\u0458\u0432\u0435\u045b\u0438 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 \u0437\u0430 \u0444\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435. \u0424\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u043a\u043e\u0440\u0438\u0441\u0442\u0435 \u0440\u0430\u0437\u043d\u0435 \u043c\u0435\u0440\u0435 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438, \u0443\u043a\u0459\u0443\u0447\u0443\u0458\u0443\u045b\u0438 \u0435\u043d\u043a\u0440\u0438\u043f\u0446\u0438\u0458\u0443, \u0432\u0438\u0448\u0435\u0444\u0430\u043a\u0442\u043e\u0440\u0441\u043a\u0443 \u0430\u0443\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0458\u0443 \u0438 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0434\u0430 \u0431\u0438 \u0437\u0430\u0448\u0442\u0438\u0442\u0438\u043b\u0435 \u043f\u043e\u0434\u0430\u0442\u043a\u0435 \u043a\u043b\u0438\u0458\u0435\u043d\u0430\u0442\u0430 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0458\u0441\u043a\u0435 \u0442\u0440\u0430\u043d\u0441\u0430\u043a\u0446\u0438\u0458\u0435. \u041c\u0435\u0440\u0435 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438 \u0441\u0443 \u043a\u0459\u0443\u0447\u043d\u0435 \u0437\u0430 \u0433\u0440\u0430\u0434\u045a\u0443 \u043f\u043e\u0443\u0437\u0434\u0430\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0458\u0435\u043d\u0430\u0442\u0430 \u0438 \u0441\u043f\u0440\u0435\u0447\u0430\u0432\u0430\u045a\u0435 \u043f\u0440\u0435\u0432\u0430\u0440\u0435 \u0443 \u0444\u0438\u043d\u0442\u0435\u0445 \u0438\u043d\u0434\u0443\u0441\u0442\u0440\u0438\u0458\u0438. \u0424\u0438\u043d\u0442\u0435\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0458\u0435 \u043a\u043e\u0458\u0435 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u043e \u043f\u0440\u0438\u0441\u0442\u0443\u043f\u0430\u0458\u0443 \u043c\u0435\u0440\u0430\u043c\u0430 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442\u0438 \u0441\u0443 \u0432\u0438\u0448\u0435 \u0441\u043a\u043b\u043e\u043d\u0435 \u0434\u0430 \u043f\u0440\u0438\u0432\u043b\u0430\u0447\u0435 \u0438 \u0437\u0430\u0434\u0440\u0436\u0438 \u043a\u043b\u0438\u0458\u0435\u043d\u0442\u0435 \u0438 \u0438\u0437\u0431\u0435\u0433\u043d\u0443 \u0434\u0440\u0443\u0433\u043e\u0440\u0430\u0437\u0440\u0443\u0448\u0443\u045b\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u0438\u0446\u0435 \u043a\u0440\u0448\u0435\u045a\u0430 \u043f\u043e\u0434\u0430\u0442\u0430\u043a\u0430.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sa kao \u0161to finansijska tehnologija (finteh) nastavlja da revolucioni\u0161e finansijsku industriju, potreba za ja\u010dim bezbednosnim merama postaje sve ve\u0107a. Finteh kompanije posluju u digitalnom okru\u017eenju gde je valuta podaci, a samo jedno kr\u0161enje podataka mo\u017ee imati katastrofalne posledice. U \u010dlanku su obra\u0111ene bezbednosne mere koje finteh kompanije primenjuju da bi obezbedile finansijske transakcije, zna\u010daj bezbednosnih [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2290,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[1275,1285,1289,1288,1286,1292,1281,1282,1290,1284,1293,1278,1280,1291,1277,1276,1283,951,1287,1279,1241],"class_list":{"0":"post-2288","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-67","8":"tag-1275","9":"tag-1285","10":"tag-1289","11":"tag-1288","12":"tag-1286","13":"tag-1292","14":"tag-1281","15":"tag-1282","16":"tag-1290","17":"tag-1284","18":"tag-1293","19":"tag-1278","20":"tag-1280","21":"tag-1291","22":"tag-1277","23":"tag-1276","24":"tag-1283","25":"tag-951","26":"tag-1287","27":"tag-1279","28":"tag-1241"},"_links":{"self":[{"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/posts\/2288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/comments?post=2288"}],"version-history":[{"count":5,"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/posts\/2288\/revisions"}],"predecessor-version":[{"id":2636,"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/posts\/2288\/revisions\/2636"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/media\/2290"}],"wp:attachment":[{"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/media?parent=2288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/categories?post=2288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wiweb.org\/sr\/wp-json\/wp\/v2\/tags?post=2288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}