Home
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 14, 2025
Pages: 379 - 389
Review paper
See full issue

INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
SAOBRAĆAJNI FAKULTET TRAVNIK U TRAVNIKU
EKOLOŠKI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET INFORMACIONIH TEHNOLOGIJA TRAVNIK U TRAVNIKU
FAKULTET POLITEHNIČKIH NAUKA TRAVNIK U TRAVNIKU

u saradnji sa

FAKULTETA ZA LOGISTIKO UNIVERZA V MARIBORU, SLOVENIJA

organizuju

33. MEĐUNARODNU KONFERENCIJU

"IZAZOVI NOVIH TEHNOLOGIJA U FUNKCIJI MOBILNOSTI I ODRŽIVOG RAZVOJA"

15. - 16. maj 2026. godine

Metrics and citations
Abstract views: 54
PDF Downloads: 46
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 24.11.2025. >> Accepted: 01.12.2025. >> Published: 12.12.2025. Review paper

SAJBER (CYBER) BEZBJEDNOST - PRIJETNJE I ZAŠTITA SAJBER (CYBER) BEZBJEDNOST – ZAŠTITA

By
Vlado Jovanović ,
Vlado Jovanović

Uprava za policijsku podršku, MUP RS , Banja Luka , Bosnia and Herzegovina

Boris Tušinski
Boris Tušinski

OSA/OBA Bosna i Hercegovina , Sarajevo , Bosnia and Herzegovina

Abstract

Cyber security in the current global relations of data and information exchange through ICT (information communication technology) represents a certain condition that should guarantee any twosided form of protection against Cyber Attacks in the exchange of data based on the communication platforms used in the exchange. This type of security implies a certain practice and the need of a business entity to protect information (digital information) in terms of human (personal data and
credentials), infrastructural (facilities and business environment), procedural (manufacturing processes and procedures) and technical-technological (devices and equipment for storing, exchanging and protecting information) resources. Any omission, intentional or accidental (software, hardware or human) can lead to a security intrusion-breakthrough and contamination of the system with incalculable consequences and damage. For effective prevention and countering of Cyber Attacks and VTK, it is necessary that all ICT users invest maximum effort and resources in the security protection of the system and environment in which they operate by implementing the best and most effective protection system currently offered on the market. In the paper, we will analyze some of the most common cyber threatsattacks on traditional systems-platforms of security protection (article: Cyber security-threats) of human, material, technical, infrastructural and financial resources and propose an improvement, that is, the best protection system in order to avoid potential attacks and eventual interventions (article: Cyber securityprotection).

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.