Home
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 14, 2025
Pages: 369 - 378
Review paper
See full issue

INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
SAOBRAĆAJNI FAKULTET TRAVNIK U TRAVNIKU
EKOLOŠKI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET INFORMACIONIH TEHNOLOGIJA TRAVNIK U TRAVNIKU
FAKULTET POLITEHNIČKIH NAUKA TRAVNIK U TRAVNIKU

u saradnji sa

FAKULTETA ZA LOGISTIKO UNIVERZA V MARIBORU, SLOVENIJA

organizuju

33. MEĐUNARODNU KONFERENCIJU

"IZAZOVI NOVIH TEHNOLOGIJA U FUNKCIJI MOBILNOSTI I ODRŽIVOG RAZVOJA"

15. - 16. maj 2026. godine

Metrics and citations
Abstract views: 2
PDF Downloads: 3
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 24.11.2025. >> Accepted: 01.12.2025. >> Published: 12.12.2025. Review paper

SAJBER (CYBER) BEZBJEDNOST - PRIJETNJE I ZAŠTITA SAJBER (CYBER) BEZBJEDNOST – PRIJETNJE

By
Vlado Jovanović ,
Vlado Jovanović

Uprava za policijsku podršku, MUP RS , Banja Luka , Bosnia and Herzegovina

Boris Tušinski
Boris Tušinski

OSA/OBA Bosna i Hercegovina , Sarajevo , Bosnia and Herzegovina

Abstract

When we talk about Cyber Security, the crucial question is: "What should every IT administrator and user know about the security and protection of the systems (they maintain and use) from Cyber Attacks?" However, only knowledge of cyber security options is no longer enough because standard protection mechanisms can be easily bypassed if the permanent upgrade of the security protection system and the raising of employees' awareness of security and protection, both personal and systemic, are neglected. Any failure (software, hardware or human) can lead to a security intrusion-breakthrough and contamination of the system with incalculable consequences and damage. In practice, there is no complete-absolute security protection, there are only systems that are more or less vulnerable, that is, that have a lower or higher level of protection with a developed system of detection and deterrence. Repression, that is, intervention after an attack with harmful consequences, is a last resort and should be avoided. For the effective prevention and countering of Cyber Attacks and VTK, it is necessary that all users of ICT (information communication technology) invest maximum effort and funds in the security protection of the system and environment in which they operate. In the paper, we will analyze some of the most common Cyber Attacks on traditionalsystems- platforms of security protection (article: Cyber security-threats) of human, material, technical, infrastructural and financial resources and propose an improvement, that is, the best protection system in order to avoid potential attacks and eventual interventions (article: Cyber securityprotection).

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.