Home Proceedings Organization Program News Contact
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 14, 2025
Pages: 187 - 192
Review Scientific Paper
Computer Sciences Editor: Dejan Kojic
See full issue

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Metrics and citations
Abstract views: 24
PDF Downloads: 11
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 22.08.2025. Revised: 25.11.2025. >> Accepted: 19.11.2025. >> Published: 21.11.2025. Review Scientific Paper Computer Sciences Editor: Dejan Kojic

"EYES WIDE OPEN" – ONE OF THE FUNDAMENTALS OF INFORMATION SECURITY

By
Alen Kamiš ,
Alen Kamiš
Contact Alen Kamiš

Faculty of Computer science, The College of Service Business , Sokolac, East Sarajevo , Bosnia and Herzegovina

Aleksandar Zakic ,
Aleksandar Zakic

Faculty of Information Technologies, Alfa BK University , Belgrade , Serbia

Marko Zakić ,
Marko Zakić

Toplica Academy of Professional Studies, Toplica Academy of Professional Studies , Prokuplje , Serbia

Nemanja Deretic
Nemanja Deretic

Belgrade Business and Arts Academy of Applied Studies, Belgrade Business and Arts Academy of Applied Studies , Belgrade , Serbia

Abstract

This paper presents an original scientific contribution through the comprehensive application of the case study methodology in analyzing the evolving cyber threats that shape information security in the 21st century. Rather than relying on a descriptive or review-based approach, the paper introduces a clear scientific structure with defined criteria for selecting case studies, a methodological framework, and a transversal analysis across different types of attacks. The objective is to provide deeper insight into the behavioral patterns of modern threat actors, identify critical vulnerabilities, and formulate recommendations that can be practically applied within organizations of all sizes. The paper includes four extended case studies based on a combination of academic literature, industry reports, and contemporary sources.

References

Boffey, D. (2025). Russia accused of trying to hack border security cameras to disrupt Ukraine aid. The Guardian. The Guardian. Retrieved July 13, 2025 from Https://Www.Theguardian.Com/World/2025/May/21/Russia-Accused-Trying-Disrupt-Aid-Ukraine-Hacking-Border-Crossings?Utm_source=chatgpt.Com.
CrowdStrike. (2023).
E.N.I.S.A. (2024). Threat Landscape Report 2024. European Union Agency for Cybersecurity.
Fish, I., & Witherow, T. (2025). Marks & Spencer faces £300m hit from cyberattack. The Times. Retrieved July 13, 2025 from Https://Www.Thetimes.Com/Business-Money/Companies/Article/Marks-and-Spencer-300m-Cost-Cyberattack-9gln92jd9?Utm_source=chatgpt.Com®ion=global.
Kushner, D. (2024). The real story of Stuxnet. IEEE Spectrum. Report. Retrieved July 13, 2025 from Https://Spectrum.Ieee.Org/the-Real-Story-of-Stuxnet.
Langner, R. (2013). To Kill a Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve. The Langner Group.
Malwarebytes. (2024). What was WannaCry? | WannaCry Ransomware | Malwarebytes. Retrieved July 13, 2025 from https://www.malwarebytes.com/wannacry.
Microsoft . (2018). Security Intelligence Report. Microsoft Corporation.
Yin, R. K. (2014). Case Study Research: Design and Methods. SAGE Publications.
Zscaler. (n.d.). What is the SolarWinds cyberattack? What is the SolarWinds cyberattack? In Zscaler. Retrieved July 13, 2025 from https://www.zscaler.com/resources/security-terms-glossary/what-is-the-solarwinds-cyberattack.
Owda, A. (2025). Major cyber attacks in review: February 2025 - SOCRadar® Cyber Intelligence Inc. SOCRadar® Cyber Intelligence Inc. Report. Retrieved July 13, 2025 from https://socradar.io/major-cyber-attacks-in-review-february-2025/?utm_source=chatgpt.com.
Sinha, S., & Bernroider, E. (2022). Supply chain attacks and software integrity: Lessons from SolarWinds. Journal of Cybersecurity, 8(2), 112–130.

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.