Metrics

  • citations in SCIndeks: [6]
  • citations in CrossRef:[3]
  • citations in Google Scholar:[]
  • visits in previous 30 days:13
  • full-text downloads in 30 days:9

Contents

article: 9 from 9  
Back back to result list
2015, vol. 70, iss. 2, pp. 346-349
How to maintain a business continuity despite cyber incidents?
nema
Abstract
Modern IT systems can bring a lot of advantages in terms of electronic commerce and governance as well as an automatic process control within industry, traffic and the other ways of classical and critical infrastructure. However, beside many advantages regarding technological development, there are also some drawbacks in sense of cyber risks, threats and the real hacker's attacks. In this article, we plan to deal with all these cyber risks caused by IT incidents and emergency situations that are capable to threaten a business continuity within big companies as well as medium and small enterprises.
References
*** (2014) Juniper networks perspectives on rand Corporation's report, from underground city to thriving metropolis: An economic analysis of the cyber black markets
Ablon, L., Libicki, M.C., Golay, A.A. (2014) Markets for Cybercrime Tools and Stolen Data. RAND Corporation
Booz, H.A. (2011) Cyber operations maturity framework: A model for collaborative, dynamic cybersecurity
Burr, B., Hash, J.S. (2002) Techniques for system and data recovery. ITL Bulletin
Charney, S. (2009) Rethinking the cyber threat: A framework and path forward. Microsoft
Ngo, H.N., Wu, X., le Dung, P., Wilson, C., Srinivasan, B. (2010) Dynamic Key Cryptography and Applications. International Journal of Network Security
Nikić, S. (2010) Najčešće metode napada cyber kriminalaca i kako se odbraniti. ZITEH
Omari, A., Al-Kasasbeh, B., Al-Qutaish, R., Muhairat, M. (2009) DEA-RTA: A Dynamic Encryption Algorithm for the Real-Time Applications, INTERNATI. ONAL Journal of Computers
Ožegović, L., Pavlović, N. (2012) Menadžment malih i srednjih preduzeća nosilac razvoja privrede. Škola biznisa, br. 1, str. 74-84
Urošević, V., Uljanov, S., Vuković, R. (2010) Policija i visokotehnološki kriminal - primeri iz prakse i problemi u radu MUP-a Republike Srbije. ZITEH
White, G. (2007) The Community Cyber Security Maturity Model. in: 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
 

About

article language: Serbian
document type: Professional Paper
DOI: 10.5937/tehnika1502346D
published in SCIndeks: 04/11/2015