This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The College of Service Business , Sokolac, Istočno Sarajevo , Bosnia and Herzegovina
This paper covers technologies needed for protection of an IT System. Cyber attacks are more frequent then ever and lots of attention should be given to protection from these attacks. This paper covers basis of protecting an IT system and data. In today's business a competitiveness is maintained mainly by high quality back-office processes and large automatization of those processes. For automatization of business processes an IT system is mandatory.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.