Security of information systems
Автор: Željko Bjelajac Đ., Vesić Lj. Slavimir
Журнал: Pravo - teorija i praksa @pravni-fakultet
Рубрика: Review paper
Статья в выпуске: 2 vol.37, 2020 года.
Бесплатный доступ
In modern business conditions, organizations have achieved their missions, visions and goals of using information systems. They enable them to share data, information and knowledge with a changing environment, to carry out daily activities smoothly, and to create the basis for strategic decisions. As new modalities for compromising information systems security emerge due to the changing unsafe environment and threats that lurk from cyberspace, it is necessary to pay attention to them and to respond appropriately, since it is no longer only a question of vulnerability of information and communication infrastructure and information, but also of human life. In the security of information systems itself, in addition to the technical security measures implemented following the defined security policy, it’s necessary to pay attention to the human factor and security awareness, as the weakest link, and to act to minimize threats.
Information systems, security, cyber security, human factor
Короткий адрес: https://sciup.org/170202263
IDR: 170202263 | DOI: 10.5937/ptp2002063B
Список литературы Security of information systems
- Bjelajac, Ž., Jovanović, M. (2013). Pojedini aspekti bezbedonosne kulture na Internetu. Kultura Polisa, 10 (21), str. 99-114
- Bocij, P., Greasley, A., Hickie, S. (2015). Business Information Systems (5th ed.). Harlow, United Kingdom, Pearson
- Bourgeois, D. (2014). Information Systems for Business and Beyond. Saylor Foundation. Preuzeto sa: https://resources.saylor.org/wwwresources/archived/site/textbooks/Information%20Systems%20for%20Business%20and%20Beyond.pdf
- Đukić, S. (2017). Osnove i sistem bezbednosti u strategiji nacionalne bezbednosti. Vojno delo, 69 (7), str. 100-121
- Eight major benefits of having a Managed Security Services Provider (MSSP). Preuzeto sa: https://www.infradata.co.uk/news-blog/8-majorbenefts-of-having-a-managed-security-services-provider-mssp/
- Henshaw, M., Dahmann, J., Lawson, B. (2019). Systems of Systems (SoS). Preuzeto sa: https://www.sebokwiki.org/wiki/Systems_of_Systems_(SoS)
- Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), str. 83-95
- Ilić, P. (2011). Semantičko-leksikografski aspekti pojma bezbednosti. Vojno delo, 63(3), str. 85-99
- ISO/IEC. (2004). International standard 13335-1. Preuzeto sa: https://www.sis.se/api/document/preview/905483/
- Kurose, J., Ross, K. (2009). Umrežavanje računara - Od vrha ka dnu (4. izd.). Beograd, Srbija: Računarski fakultet
- Milanović, Z., Radovanović, R. (2015). Informaciono-bezbedonosna kultura - imperativ savremenog društva. NBP. Nauka, bezbednost, policija, 20(3), str. 45-65
- Pleskonjić, D., Maček, N., Đorđević, B., Carić, M. (2006). Sigurnost računarskih mreža. Beograd, Srbija, Viša elektrotehnička škola u Beogradu
- Šnajer, B. (2007). Primenjena kriptografja - prevod drugog izdanja. Beograd, Mikro knjiga.
- Digitalni potpis. Preuzeto sa: http://ca.mup.gov.rs/digitalni-potpis-lat.html
- Stair, R., Reynolds, G. (2017). Principles of Information Systems (13th ed.). Boston, Massachusetts, USA: Cengage Learning
- Stallings, W., Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Harlow, United Kingdom: Pearson
- Types of Network Attacks against Confidentiality, Integrity and Avilability. Preuzeto sa: https://www.omnisecu.com/ccna-security/types-of-networkattacks.php
- Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security. 38, str. 97-102