- citati u SCIndeksu: 0
- citati u CrossRef-u:0
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:10
- preuzimanja u poslednjih 30 dana:7
|
|
2020, vol. 37, br. 2, str. 63-76
|
Bezbednost informacionih sistema
Security of information systems
aUniverzitet Privredna akademija u Novom Sadu, Pravni fakultet za privredu i pravosuđe bUniverzitet Privredna akademija u Novom Sadu, Fakultet za ekonomiju i inženjerski menadžment - FIMEK
e-adresa: zdjbjelajac@gmail.com, vesic.slavimir@gmail.com
Sažetak
U savremenim uslovima poslovanja organizacije ostvaruju svoje misije, vizije i ciljeve upotrebom informacionih sistema. Oni im omogućavaju razmenu podataka, informacija i znanja sa promenljivim okruženjem, nesmetano obavljanje dnevnih aktivnosti, kao i stvaranje osnove za donošenje strateških odluka. Kako se novi modaliteti ugrožavanja bezbednosti informacionih sistema pojavljuju usled promenljivog nebezbednog okruženja i pretnji koje vrebaju iz sajber prostora, potrebno je obratiti pažnju na iste i adekvatno reagovati, pošto nije više u pitanju samo ranjivost informatičko-komunikacione infrastrukture i informacija, već i ljudskog života. U samoj bezbednosti informacionih sistema, pored tehnički mera zaštite koje se sprovode u skladu sa definisanom politikom bezbednosti, potrebno je obratiti pažnju i na ljudski faktor i svest o bezbednosti, kao najslabiju kariku i delovati kako bi se pretnje svele na najmanju moguću meru.
Abstract
In modern business conditions, organizations have achieved their missions, visions and goals of using information systems. They enable them to share data, information and knowledge with a changing environment, to carry out daily activities smoothly, and to create the basis for strategic decisions. As new modalities for compromising information systems security emerge due to the changing unsafe environment and threats that lurk from cyberspace, it is necessary to pay attention to them and to respond appropriately, since it is no longer only a question of vulnerability of information and communication infrastructure and information, but also of human life. In the security of information systems itself, in addition to the technical security measures implemented following the defined security policy, it's necessary to pay attention to the human factor and security awareness, as the weakest link, and to act to minimize threats.
|
|
|
Reference
|
|
*** Digitalni potpis. Preuzeto sa: http://ca.mup.gov.rs/digitalni-potpis-lat.html
|
|
*** Types of network attacks against confidentiality, integrity and avilability. Preuzeto sa: https://www.omnisecu.com/ccna-security/types-of-network-attacks.php
|
|
*** Eight major benefits of having a Managed Security Services Provider (MSSP). Preuzeto sa: https://www.infradata.co.uk/news-blog/8-major-benefits-of-having-a-managed-security-services-provider-mssp/
|
|
Bjelajac, Ž.Đ., Jovanović, M.B. (2013) Pojedini aspekti bezbednosne kulture na internetu. Kultura polisa, vol. 10, br. 21, str. 99-114
|
|
Bocij, P., Greasley, A., Hickie, S. (2015) Business information systems. Harlow, United Kingdom: Pearson
|
|
Bourgeois, D. (2014) Information systems for business and beyond. Saylor Foundation, Preuzeto sa: https://resources.saylor.org/wwwresources/archived/site/textbooks/Information%20Systems%20for%20Business%20and%20Beyond.pdf
|
6
|
Đukić, S. (2017) Osnove i sistem bezbednosti u strategiji nacionalne bezbednosti. Vojno delo, vol. 69, br. 7, str. 100-121
|
|
Henshaw, M., Dahmann, J., Lawson, B. (2019) Systems of Systems (SoS). Preuzeto sa: https://www.sebokwiki.org/wiki/Systems_of_Systems_(SoS)
|
|
Ifinedo, P. (2012) Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1): 83-95
|
2
|
Ilić, P. (2011) Semantičko-leksikografski aspekti pojma bezbednosti. Vojno delo, vol. 63, br. 3, str. 85-99
|
|
ISO (2004) International standard 13335-1. Preuzeto sa: https://www.sis.se/api/document/preview/905483/
|
|
Kurose, J., Ross, K. (2009) Umrežavanje računara - od vrha ka dnu. Beograd: Računarski fakultet
|
3
|
Milanović, Z., Radovanović, R. (2015) Informaciono-bezbednosna kultura - imperativ savremenog društva. NBP. Nauka, bezbednost, policija, vol. 20, br. 3, str. 45-65
|
1
|
Pleskonjić, D., Đorđević, B., Maček, N., Carić, M. (2006) Sigurnost računarskih mreža. Beograd: Viša elektrotehnička škola u Beogradu
|
1
|
Stair, R., Reynolds, G. (2017) Principles of information systems. Boston, Massachusetts, USA: Cengage Learning
|
|
Stallings, W., Brown, L. (2018) Computer security: Principles and practice. Pearson: Harlow, United Kingdom
|
|
Šnajer, B. (2007) Primenjena kriptografija - prevod drugog izdanja. Beograd: Mikro knjiga
|
1
|
von Solms, R., van Niekerk, J. (2013) From information security to cyber security. Computers & Security, 38: 97-102
|
|
|
|