SECURITY OF INFORMATION SYSTEMS
Keywords:
information systems, security, cyber security, human factorAbstract
In modern business conditions, organizations have achieved their missions, visions and goals of using information systems. They enable them to share data, information and knowledge with a changing environment, to carry out daily activities smoothly, and to create the basis for strategic decisions. As new modalities for compromising information systems security emerge due to the changing unsafe environment and threats that lurk from cyberspace, it is necessary to pay attention to them and to respond appropriately, since it is no longer only a question of vulnerability of information and communication infrastructure and information, but also of human life. In the security of information systems itself, in addition to the technical security measures implemented following the defined security policy, it’s necessary to pay attention to the human factor and security awareness, as the weakest link, and to act to minimize threats.
References
Bjelajac, Ž., Jovanović, M. (2013). Pojedini aspekti bezbedonosne kulture na Internetu. Kultura Polisa, 10 (21), str. 99-114
Bocij, P., Greasley, A., Hickie, S. (2015). Business Information Systems (5th ed.). Harlow, United Kingdom, Pearson
Bourgeois, D. (2014). Information Systems for Business and Beyond. Saylor Foundation. Preuzeto sa: https://resources.saylor.org/wwwresources/archived/site/textbooks/Information%20Systems%20for%20Business%20and%20Beyond.pdf
Đukić, S. (2017). Osnove i sistem bezbednosti u strategiji nacionalne bezbednosti. Vojno delo, 69 (7), str. 100-121
Eight major benefits of having a Managed Security Services Provider (MSSP). Preuzeto sa: https://www.infradata.co.uk/news-blog/8-majorbenefts-of-having-a-managed-security-services-provider-mssp/
Henshaw, M., Dahmann, J., Lawson, B. (2019). Systems of Systems (SoS). Preuzeto sa: https://www.sebokwiki.org/wiki/Systems_of_Systems_(SoS)
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), str. 83-95
Ilić, P. (2011). Semantičko-leksikografski aspekti pojma bezbednosti. Vojno delo, 63(3), str. 85-99
ISO/IEC. (2004). International standard 13335-1. Preuzeto sa: https://www.sis.se/api/document/preview/905483/
Kurose, J., Ross, K. (2009). Umrežavanje računara - Od vrha ka dnu (4. izd.). Beograd, Srbija: Računarski fakultet
Milanović, Z., Radovanović, R. (2015). Informaciono-bezbedonosna kultura - imperativ savremenog društva. NBP. Nauka, bezbednost, policija, 20(3), str. 45-65
Pleskonjić, D., Maček, N., Đorđević, B., Carić, M. (2006). Sigurnost računarskih mreža. Beograd, Srbija, Viša elektrotehnička škola u Beogradu
Šnajer, B. (2007). Primenjena kriptografja - prevod drugog izdanja. Beograd, Mikro knjiga.
Digitalni potpis. Preuzeto sa: http://ca.mup.gov.rs/digitalni-potpis-lat.html
Stair, R., Reynolds, G. (2017). Principles of Information Systems (13th ed.). Boston, Massachusetts, USA: Cengage Learning
Stallings, W., Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Harlow, United Kingdom: Pearson
Types of Network Attacks against Confidentiality, Integrity and Avilability. Preuzeto sa: https://www.omnisecu.com/ccna-security/types-of-networkattacks.php
Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security. 38, str. 97-102
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 by the authors

This work is licensed under a Creative Commons Attribution 4.0 International License.






