Home Archive Organization Program News Contact
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 10, Issue 1, 2020
Pages: 365 - 370
Preliminary communication
See full issue

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Metrics and citations
Abstract views: 9
PDF Downloads: 0
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: >> Accepted: >> Published: 10.10.2020. Preliminary communication

CYBER ATTACK AND THREAT PROTECTION

By
Alen Kamiš
Alen Kamiš

The College of Service Business , Sokolac, Istočno Sarajevo , Bosnia and Herzegovina

Abstract

 This paper covers technologies needed for protection of an IT System. Cyber attacks are more frequent then ever and lots of attention should be given to protection from these attacks. This paper covers basis of protecting an IT system and data. In today's business a competitiveness is maintained mainly by high quality back-office processes and large automatization of those processes. For automatization of business processes an IT system is mandatory. 

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.