INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
SAOBRAĆAJNI FAKULTET TRAVNIK U TRAVNIKU
EKOLOŠKI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET INFORMACIONIH TEHNOLOGIJA TRAVNIK U TRAVNIKU
FAKULTET POLITEHNIČKIH NAUKA TRAVNIK U TRAVNIKU
u saradnji sa
FAKULTETA ZA LOGISTIKO UNIVERZA V MARIBORU, SLOVENIJA
organizuju
33. MEĐUNARODNU KONFERENCIJU
"IZAZOVI NOVIH TEHNOLOGIJA U FUNKCIJI MOBILNOSTI I ODRŽIVOG RAZVOJA"
15. - 16. maj 2026. godine
Uprava za policijsku podršku, MUP RS , Banja Luka , Bosnia and Herzegovina
OSA/OBA Bosna i Hercegovina , Sarajevo , Bosnia and Herzegovina
Cyber security in the current global relations of data and information exchange through ICT (information communication technology) represents a certain condition that should guarantee any twosided form of protection against Cyber Attacks in the exchange of data based on the communication platforms used in the exchange. This type of security implies a certain practice and the need of a business entity to protect information (digital information) in terms of human (personal data and
credentials), infrastructural (facilities and business environment), procedural (manufacturing processes and procedures) and technical-technological (devices and equipment for storing, exchanging and protecting information) resources. Any omission, intentional or accidental (software, hardware or human) can lead to a security intrusion-breakthrough and contamination of the system with incalculable consequences and damage. For effective prevention and countering of Cyber Attacks and VTK, it is necessary that all ICT users invest maximum effort and resources in the security protection of the system and environment in which they operate by implementing the best and most effective protection system currently offered on the market. In the paper, we will analyze some of the most common cyber threatsattacks on traditional systems-platforms of security protection (article: Cyber security-threats) of human, material, technical, infrastructural and financial resources and propose an improvement, that is, the best protection system in order to avoid potential attacks and eventual interventions (article: Cyber securityprotection).
cyber (cyber) security, cyber threats-attacks, analysis of traditional protection systemsplatforms, proposal for improvement, best protection system
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.