INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
SAOBRAĆAJNI FAKULTET TRAVNIK U TRAVNIKU
EKOLOŠKI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET INFORMACIONIH TEHNOLOGIJA TRAVNIK U TRAVNIKU
FAKULTET POLITEHNIČKIH NAUKA TRAVNIK U TRAVNIKU
u saradnji sa
FAKULTETA ZA LOGISTIKO UNIVERZA V MARIBORU, SLOVENIJA
organizuju
33. MEĐUNARODNU KONFERENCIJU
"IZAZOVI NOVIH TEHNOLOGIJA U FUNKCIJI MOBILNOSTI I ODRŽIVOG RAZVOJA"
15. - 16. maj 2026. godine
Uprava za policijsku podršku, MUP RS , Banja Luka , Bosnia and Herzegovina
OSA/OBA Bosna i Hercegovina , Sarajevo , Bosnia and Herzegovina
When we talk about Cyber Security, the crucial question is: "What should every IT administrator and user know about the security and protection of the systems (they maintain and use) from Cyber Attacks?" However, only knowledge of cyber security options is no longer enough because standard protection mechanisms can be easily bypassed if the permanent upgrade of the security protection system and the raising of employees' awareness of security and protection, both personal and systemic, are neglected. Any failure (software, hardware or human) can lead to a security intrusion-breakthrough and contamination of the system with incalculable consequences and damage. In practice, there is no complete-absolute security protection, there are only systems that are more or less vulnerable, that is, that have a lower or higher level of protection with a developed system of detection and deterrence. Repression, that is, intervention after an attack with harmful consequences, is a last resort and should be avoided. For the effective prevention and countering of Cyber Attacks and VTK, it is necessary that all users of ICT (information communication technology) invest maximum effort and funds in the security protection of the system and environment in which they operate. In the paper, we will analyze some of the most common Cyber Attacks on traditionalsystems- platforms of security protection (article: Cyber security-threats) of human, material, technical, infrastructural and financial resources and propose an improvement, that is, the best protection system in order to avoid potential attacks and eventual interventions (article: Cyber securityprotection).
Cyber Security, standard protection mechanisms, system upgrade, Cyber Attacks, analysis of traditional protection systems, proposal for improving the protection system
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.