| Peer-Reviewed

Management of Security Processes in Information Technologies

Received: 16 June 2021    Accepted: 25 June 2021    Published: 31 December 2021
Views:       Downloads:
Abstract

Confronted with challenges of the Information Technology, the companies have recognized the need to strengthen the resilience of its systems and structure – to strengthen cyber culture and security through continuous innovation and adjustment of the regulatory framework. The improvement of institutional capacities as a whole and continuous monitoring, evaluation and control of organizational and operational responses to cyber challenges is crucial. The goal is to establish a balance between available opportunities and the capacity for proactive performance on the one hand, and dynamic, complex and hard-to-predict cyber threats and risks, on the other. The main cause of these obstacles is definition of information security. Every sector, company must make definition of information security itself. In that way significance of information security will be raise on higher level. When we appreciate information security we may expectation better results in this aria. We need preventive control, data encryption, electronic signatures, monitoring system, control of employs, control archiving system. Finding new strategies and unique programs that will timely and effectively respond to security challenges, risks and threats and enable information technology users to live in an ever-changing world is an imperative of modern society. When it’s about Serbia as a developing country, if we would observe the context of ultra-dynamic technological changes and globalization of economic flows, several questions stand to be dominant. Security of information as a key parameter affects business risks and therefore stands out as a very important factor. Preserving the confidentiality, integrity and availability of information is providing a way of accessing confidential information only to authorized persons. Integrity is maintaining the consistency of information and certifying that information is not altered. Availability certifies that information is always available when needed. The impact that losses of confidentiality, integrity and availability of information may have on assets can be critical to the organization.

Published in American Journal of Management Science and Engineering (Volume 6, Issue 6)
DOI 10.11648/j.ajmse.20210606.17
Page(s) 224-230
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2021. Published by Science Publishing Group

Keywords

Confidentiality, Cyber-Attacks, Digital Technologies, ICT Systems, Security Processes, Security Risk

References
[1] Čelik P. (2019). Institutional Measures for Enhancing Business Cyber Security in the European Union, Економске теме, ISSN 0353-8648 (eISSN 2217-3668), UDK33 (497.11). Niš, oktobar 2019.
[2] Danchev, D., Building and Implementing a Successful Information Security Policy, http://www.windowsecurity.com/pages/security-policy.pdf(20.12.2015.
[3] http://www.windowsecurity.com/pages/security-policy.pdf (20. 12. 2015).
[4] https://positive.rs/konsalting-i-edukacija/bis-bezbednost-informacionih-sistema/
[5] Milanović, Z., Srećković, M., Znanjem protiv zloupotrebe enkripcije, Naučno-stručni skup sa međunarodnim učešćem “Suprostavljanje savremenim oblicima kriminaliteta – analiza stanja, evropski standardi i mere za unapređenje”, Zbornik, Tom 3, Tara, 2015, pp. 135–147.
[6] Pejanović Lj., Komarčević M., Čelik P. (2017). Centralizacija i militarizacija područja bezbednosti u Evropskoj Uniji, Crisis Management Days, 10th International Scientific Conference, Velika Gorica.
[7] Petrović, S., Zaštita računarskih sistema, Viša železnička škola, Beograd, 2004.
[8] Swanson, E., Ramiller, N. “The organizing vision in information systems innovation”, Organization Science 8 (5), 1997, pp. 458–474.
[9] Social Inclusion and Poverty Reduction Team, 2018, The third national report on social inclusion and poverty reduction in the Republic of Serbia, https://bit.ly/2XoiPQw
[10] Western Balkans Labor Market Trends 2019, World Bank (2019b), Washington DC.
[11] https://www.batimes.com/articles/addressing-information-security-in-business-analysis-with-sabsa.html
Cite This Article
  • APA Style

    Dragan Vucinic. (2021). Management of Security Processes in Information Technologies. American Journal of Management Science and Engineering, 6(6), 224-230. https://doi.org/10.11648/j.ajmse.20210606.17

    Copy | Download

    ACS Style

    Dragan Vucinic. Management of Security Processes in Information Technologies. Am. J. Manag. Sci. Eng. 2021, 6(6), 224-230. doi: 10.11648/j.ajmse.20210606.17

    Copy | Download

    AMA Style

    Dragan Vucinic. Management of Security Processes in Information Technologies. Am J Manag Sci Eng. 2021;6(6):224-230. doi: 10.11648/j.ajmse.20210606.17

    Copy | Download

  • @article{10.11648/j.ajmse.20210606.17,
      author = {Dragan Vucinic},
      title = {Management of Security Processes in Information Technologies},
      journal = {American Journal of Management Science and Engineering},
      volume = {6},
      number = {6},
      pages = {224-230},
      doi = {10.11648/j.ajmse.20210606.17},
      url = {https://doi.org/10.11648/j.ajmse.20210606.17},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajmse.20210606.17},
      abstract = {Confronted with challenges of the Information Technology, the companies have recognized the need to strengthen the resilience of its systems and structure – to strengthen cyber culture and security through continuous innovation and adjustment of the regulatory framework. The improvement of institutional capacities as a whole and continuous monitoring, evaluation and control of organizational and operational responses to cyber challenges is crucial. The goal is to establish a balance between available opportunities and the capacity for proactive performance on the one hand, and dynamic, complex and hard-to-predict cyber threats and risks, on the other. The main cause of these obstacles is definition of information security. Every sector, company must make definition of information security itself. In that way significance of information security will be raise on higher level. When we appreciate information security we may expectation better results in this aria. We need preventive control, data encryption, electronic signatures, monitoring system, control of employs, control archiving system. Finding new strategies and unique programs that will timely and effectively respond to security challenges, risks and threats and enable information technology users to live in an ever-changing world is an imperative of modern society. When it’s about Serbia as a developing country, if we would observe the context of ultra-dynamic technological changes and globalization of economic flows, several questions stand to be dominant. Security of information as a key parameter affects business risks and therefore stands out as a very important factor. Preserving the confidentiality, integrity and availability of information is providing a way of accessing confidential information only to authorized persons. Integrity is maintaining the consistency of information and certifying that information is not altered. Availability certifies that information is always available when needed. The impact that losses of confidentiality, integrity and availability of information may have on assets can be critical to the organization.},
     year = {2021}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Management of Security Processes in Information Technologies
    AU  - Dragan Vucinic
    Y1  - 2021/12/31
    PY  - 2021
    N1  - https://doi.org/10.11648/j.ajmse.20210606.17
    DO  - 10.11648/j.ajmse.20210606.17
    T2  - American Journal of Management Science and Engineering
    JF  - American Journal of Management Science and Engineering
    JO  - American Journal of Management Science and Engineering
    SP  - 224
    EP  - 230
    PB  - Science Publishing Group
    SN  - 2575-1379
    UR  - https://doi.org/10.11648/j.ajmse.20210606.17
    AB  - Confronted with challenges of the Information Technology, the companies have recognized the need to strengthen the resilience of its systems and structure – to strengthen cyber culture and security through continuous innovation and adjustment of the regulatory framework. The improvement of institutional capacities as a whole and continuous monitoring, evaluation and control of organizational and operational responses to cyber challenges is crucial. The goal is to establish a balance between available opportunities and the capacity for proactive performance on the one hand, and dynamic, complex and hard-to-predict cyber threats and risks, on the other. The main cause of these obstacles is definition of information security. Every sector, company must make definition of information security itself. In that way significance of information security will be raise on higher level. When we appreciate information security we may expectation better results in this aria. We need preventive control, data encryption, electronic signatures, monitoring system, control of employs, control archiving system. Finding new strategies and unique programs that will timely and effectively respond to security challenges, risks and threats and enable information technology users to live in an ever-changing world is an imperative of modern society. When it’s about Serbia as a developing country, if we would observe the context of ultra-dynamic technological changes and globalization of economic flows, several questions stand to be dominant. Security of information as a key parameter affects business risks and therefore stands out as a very important factor. Preserving the confidentiality, integrity and availability of information is providing a way of accessing confidential information only to authorized persons. Integrity is maintaining the consistency of information and certifying that information is not altered. Availability certifies that information is always available when needed. The impact that losses of confidentiality, integrity and availability of information may have on assets can be critical to the organization.
    VL  - 6
    IS  - 6
    ER  - 

    Copy | Download

Author Information
  • Department of Economy and Finance, Modern Business School, Belgrade, Serbia

  • Sections