Confronted with challenges of the Information Technology, the companies have recognized the need to strengthen the resilience of its systems and structure – to strengthen cyber culture and security through continuous innovation and adjustment of the regulatory framework. The improvement of institutional capacities as a whole and continuous monitoring, evaluation and control of organizational and operational responses to cyber challenges is crucial. The goal is to establish a balance between available opportunities and the capacity for proactive performance on the one hand, and dynamic, complex and hard-to-predict cyber threats and risks, on the other. The main cause of these obstacles is definition of information security. Every sector, company must make definition of information security itself. In that way significance of information security will be raise on higher level. When we appreciate information security we may expectation better results in this aria. We need preventive control, data encryption, electronic signatures, monitoring system, control of employs, control archiving system. Finding new strategies and unique programs that will timely and effectively respond to security challenges, risks and threats and enable information technology users to live in an ever-changing world is an imperative of modern society. When it’s about Serbia as a developing country, if we would observe the context of ultra-dynamic technological changes and globalization of economic flows, several questions stand to be dominant. Security of information as a key parameter affects business risks and therefore stands out as a very important factor. Preserving the confidentiality, integrity and availability of information is providing a way of accessing confidential information only to authorized persons. Integrity is maintaining the consistency of information and certifying that information is not altered. Availability certifies that information is always available when needed. The impact that losses of confidentiality, integrity and availability of information may have on assets can be critical to the organization.
Published in | American Journal of Management Science and Engineering (Volume 6, Issue 6) |
DOI | 10.11648/j.ajmse.20210606.17 |
Page(s) | 224-230 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2021. Published by Science Publishing Group |
Confidentiality, Cyber-Attacks, Digital Technologies, ICT Systems, Security Processes, Security Risk
[1] | Čelik P. (2019). Institutional Measures for Enhancing Business Cyber Security in the European Union, Економске теме, ISSN 0353-8648 (eISSN 2217-3668), UDK33 (497.11). Niš, oktobar 2019. |
[2] | Danchev, D., Building and Implementing a Successful Information Security Policy, http://www.windowsecurity.com/pages/security-policy.pdf(20.12.2015. |
[3] | http://www.windowsecurity.com/pages/security-policy.pdf (20. 12. 2015). |
[4] | https://positive.rs/konsalting-i-edukacija/bis-bezbednost-informacionih-sistema/ |
[5] | Milanović, Z., Srećković, M., Znanjem protiv zloupotrebe enkripcije, Naučno-stručni skup sa međunarodnim učešćem “Suprostavljanje savremenim oblicima kriminaliteta – analiza stanja, evropski standardi i mere za unapređenje”, Zbornik, Tom 3, Tara, 2015, pp. 135–147. |
[6] | Pejanović Lj., Komarčević M., Čelik P. (2017). Centralizacija i militarizacija područja bezbednosti u Evropskoj Uniji, Crisis Management Days, 10th International Scientific Conference, Velika Gorica. |
[7] | Petrović, S., Zaštita računarskih sistema, Viša železnička škola, Beograd, 2004. |
[8] | Swanson, E., Ramiller, N. “The organizing vision in information systems innovation”, Organization Science 8 (5), 1997, pp. 458–474. |
[9] | Social Inclusion and Poverty Reduction Team, 2018, The third national report on social inclusion and poverty reduction in the Republic of Serbia, https://bit.ly/2XoiPQw |
[10] | Western Balkans Labor Market Trends 2019, World Bank (2019b), Washington DC. |
[11] | https://www.batimes.com/articles/addressing-information-security-in-business-analysis-with-sabsa.html |
APA Style
Dragan Vucinic. (2021). Management of Security Processes in Information Technologies. American Journal of Management Science and Engineering, 6(6), 224-230. https://doi.org/10.11648/j.ajmse.20210606.17
ACS Style
Dragan Vucinic. Management of Security Processes in Information Technologies. Am. J. Manag. Sci. Eng. 2021, 6(6), 224-230. doi: 10.11648/j.ajmse.20210606.17
AMA Style
Dragan Vucinic. Management of Security Processes in Information Technologies. Am J Manag Sci Eng. 2021;6(6):224-230. doi: 10.11648/j.ajmse.20210606.17
@article{10.11648/j.ajmse.20210606.17, author = {Dragan Vucinic}, title = {Management of Security Processes in Information Technologies}, journal = {American Journal of Management Science and Engineering}, volume = {6}, number = {6}, pages = {224-230}, doi = {10.11648/j.ajmse.20210606.17}, url = {https://doi.org/10.11648/j.ajmse.20210606.17}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajmse.20210606.17}, abstract = {Confronted with challenges of the Information Technology, the companies have recognized the need to strengthen the resilience of its systems and structure – to strengthen cyber culture and security through continuous innovation and adjustment of the regulatory framework. The improvement of institutional capacities as a whole and continuous monitoring, evaluation and control of organizational and operational responses to cyber challenges is crucial. The goal is to establish a balance between available opportunities and the capacity for proactive performance on the one hand, and dynamic, complex and hard-to-predict cyber threats and risks, on the other. The main cause of these obstacles is definition of information security. Every sector, company must make definition of information security itself. In that way significance of information security will be raise on higher level. When we appreciate information security we may expectation better results in this aria. We need preventive control, data encryption, electronic signatures, monitoring system, control of employs, control archiving system. Finding new strategies and unique programs that will timely and effectively respond to security challenges, risks and threats and enable information technology users to live in an ever-changing world is an imperative of modern society. When it’s about Serbia as a developing country, if we would observe the context of ultra-dynamic technological changes and globalization of economic flows, several questions stand to be dominant. Security of information as a key parameter affects business risks and therefore stands out as a very important factor. Preserving the confidentiality, integrity and availability of information is providing a way of accessing confidential information only to authorized persons. Integrity is maintaining the consistency of information and certifying that information is not altered. Availability certifies that information is always available when needed. The impact that losses of confidentiality, integrity and availability of information may have on assets can be critical to the organization.}, year = {2021} }
TY - JOUR T1 - Management of Security Processes in Information Technologies AU - Dragan Vucinic Y1 - 2021/12/31 PY - 2021 N1 - https://doi.org/10.11648/j.ajmse.20210606.17 DO - 10.11648/j.ajmse.20210606.17 T2 - American Journal of Management Science and Engineering JF - American Journal of Management Science and Engineering JO - American Journal of Management Science and Engineering SP - 224 EP - 230 PB - Science Publishing Group SN - 2575-1379 UR - https://doi.org/10.11648/j.ajmse.20210606.17 AB - Confronted with challenges of the Information Technology, the companies have recognized the need to strengthen the resilience of its systems and structure – to strengthen cyber culture and security through continuous innovation and adjustment of the regulatory framework. The improvement of institutional capacities as a whole and continuous monitoring, evaluation and control of organizational and operational responses to cyber challenges is crucial. The goal is to establish a balance between available opportunities and the capacity for proactive performance on the one hand, and dynamic, complex and hard-to-predict cyber threats and risks, on the other. The main cause of these obstacles is definition of information security. Every sector, company must make definition of information security itself. In that way significance of information security will be raise on higher level. When we appreciate information security we may expectation better results in this aria. We need preventive control, data encryption, electronic signatures, monitoring system, control of employs, control archiving system. Finding new strategies and unique programs that will timely and effectively respond to security challenges, risks and threats and enable information technology users to live in an ever-changing world is an imperative of modern society. When it’s about Serbia as a developing country, if we would observe the context of ultra-dynamic technological changes and globalization of economic flows, several questions stand to be dominant. Security of information as a key parameter affects business risks and therefore stands out as a very important factor. Preserving the confidentiality, integrity and availability of information is providing a way of accessing confidential information only to authorized persons. Integrity is maintaining the consistency of information and certifying that information is not altered. Availability certifies that information is always available when needed. The impact that losses of confidentiality, integrity and availability of information may have on assets can be critical to the organization. VL - 6 IS - 6 ER -