SECURITY OF INFORMATION SYSTEMS

Authors

  • Željko Bjelajac Đ. Faculty of Law for Commerce and Judiciary, The University of Business Academy in Novi Sad
  • Vesić Lj. Slavimir Doctoral candidate, The Faculty of Economics and Engineering Management, The University of Business Academy in Novi Sad

Keywords:

information systems, security, cyber security, human factor

Abstract

In modern business conditions, organizations have achieved their missions, visions and goals of using information systems. They enable them to share data, information and knowledge with a changing environment, to carry out daily activities smoothly, and to create the basis for strategic decisions. As new modalities for compromising information systems security emerge due to the changing unsafe environment and threats that lurk from cyberspace, it is necessary to pay attention to them and to respond appropriately, since it is no longer only a question of vulnerability of information and communication infrastructure and information, but also of human life. In the security of information systems itself, in addition to the technical security measures implemented following the defined security policy, it’s necessary to pay attention to the human factor and security awareness, as the weakest link, and to act to minimize threats.

References

Bjelajac, Ž., Jovanović, M. (2013). Pojedini aspekti bezbedonosne kulture na Internetu. Kultura Polisa, 10 (21), str. 99-114

Bocij, P., Greasley, A., Hickie, S. (2015). Business Information Systems (5th ed.). Harlow, United Kingdom, Pearson

Bourgeois, D. (2014). Information Systems for Business and Beyond. Saylor Foundation. Preuzeto sa: https://resources.saylor.org/wwwresources/archived/site/textbooks/Information%20Systems%20for%20Business%20and%20Beyond.pdf

Đukić, S. (2017). Osnove i sistem bezbednosti u strategiji nacionalne bezbednosti. Vojno delo, 69 (7), str. 100-121

Eight major benefits of having a Managed Security Services Provider (MSSP). Preuzeto sa: https://www.infradata.co.uk/news-blog/8-majorbenefts-of-having-a-managed-security-services-provider-mssp/

Henshaw, M., Dahmann, J., Lawson, B. (2019). Systems of Systems (SoS). Preuzeto sa: https://www.sebokwiki.org/wiki/Systems_of_Systems_(SoS)

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), str. 83-95

Ilić, P. (2011). Semantičko-leksikografski aspekti pojma bezbednosti. Vojno delo, 63(3), str. 85-99

ISO/IEC. (2004). International standard 13335-1. Preuzeto sa: https://www.sis.se/api/document/preview/905483/

Kurose, J., Ross, K. (2009). Umrežavanje računara - Od vrha ka dnu (4. izd.). Beograd, Srbija: Računarski fakultet

Milanović, Z., Radovanović, R. (2015). Informaciono-bezbedonosna kultura - imperativ savremenog društva. NBP. Nauka, bezbednost, policija, 20(3), str. 45-65

Pleskonjić, D., Maček, N., Đorđević, B., Carić, M. (2006). Sigurnost računarskih mreža. Beograd, Srbija, Viša elektrotehnička škola u Beogradu

Šnajer, B. (2007). Primenjena kriptografja - prevod drugog izdanja. Beograd, Mikro knjiga.

Digitalni potpis. Preuzeto sa: http://ca.mup.gov.rs/digitalni-potpis-lat.html

Stair, R., Reynolds, G. (2017). Principles of Information Systems (13th ed.). Boston, Massachusetts, USA: Cengage Learning

Stallings, W., Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Harlow, United Kingdom: Pearson

Types of Network Attacks against Confidentiality, Integrity and Avilability. Preuzeto sa: https://www.omnisecu.com/ccna-security/types-of-networkattacks.php

Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security. 38, str. 97-102

Downloads

Published

2020-06-20

How to Cite

Bjelajac Đ. , Željko, & Lj. Slavimir, V. . (2020). SECURITY OF INFORMATION SYSTEMS . Pravo - Teorija I Praksa, 37(2), 63–76. Retrieved from https://casopis.pravni-fakultet.edu.rs/index.php/ltp/article/view/5