SlideShare a Scribd company logo
1 of 12
IT SIGURNOST U VLADINIM I
MEDJUNARODNIM ORGANIZACIJAMA
Mr.sci Gorjan Damjanovic
Mr.sci Ilhan Muratovic
Mr.sci Alma Damjanovic
RAZLIKA IZMEĐU
POSLOVNOG I PRIVATNOG
KORIŠTENJA INTERNETA NA MREŽI
VANJSKE PRIJETNJE
1. Spam
2. Viruses and Malware
3. Phishing Scams
UNUTRAŠNJE PRIJETNJE
Ljudski doprinos ugrožavanju IT mreže
RESURSI POTREBNI ZA SIGURAN RAD I KORIŠTENJE
INTERNETA
MATERIJALNI RESURSI
LJUDSKI RESURSI
CISSP (Certified Information Systems Security
Professional)
CISM (Certified Information Security Manager)
MATERIJALNI RESURSI I
OČEKIVANJA
LJUDSKI RESURSI I OČEKIVANJA
PODFAKTOR: IT MENADŽERI
OSNOVNE METODE ZAŠTITE I MJERE ZAŠTITE
Policy
Physical security
Identification and authentication
Authorization
Network access control
Communication
Monitor and audit
Secure management
ZAKLJUČAK
• Awareness
• Education
• Training

More Related Content

What's hot

What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Ronan Martin
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandeyRithikaD1
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackShawn Tuma
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityJay Moliya
 
Cybersecurity
CybersecurityCybersecurity
CybersecuritySabiha M
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it businessVijilan IT Security solutions
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Happiest Minds Technologies
 

What's hot (20)

What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber Attack
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it business
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
IT Security
IT SecurityIT Security
IT Security
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 

Similar to Gorjan Damjanovic

2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2FRSecure
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxmalik298381
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localAdrian Mikeliunas
 
Information security
 Information security Information security
Information securityJin Castor
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Cyber security (ethical hacking)
Cyber security (ethical hacking)Cyber security (ethical hacking)
Cyber security (ethical hacking)Sudhanshu Chaurasia
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protectionproitsolutions
 

Similar to Gorjan Damjanovic (20)

2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2
 
Security Awareness Training Summary
Security Awareness Training SummarySecurity Awareness Training Summary
Security Awareness Training Summary
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Cyber security
Cyber securityCyber security
Cyber security
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
Information security
 Information security Information security
Information security
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Cyber security (ethical hacking)
Cyber security (ethical hacking)Cyber security (ethical hacking)
Cyber security (ethical hacking)
 
information security
information securityinformation security
information security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
 

More from Dejan Jeremic

Konferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicKonferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicDejan Jeremic
 
Konferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicKonferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićKonferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićDejan Jeremic
 
Konferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicKonferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicDejan Jeremic
 
Asistivna tehnologija
Asistivna tehnologija Asistivna tehnologija
Asistivna tehnologija Dejan Jeremic
 
Podrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaPodrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaDejan Jeremic
 
Beskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaBeskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaDejan Jeremic
 
Lokalne usluge GCSR Beograd
Lokalne usluge  GCSR BeogradLokalne usluge  GCSR Beograd
Lokalne usluge GCSR BeogradDejan Jeremic
 
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataPostupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataDejan Jeremic
 
Deinstitucionalizacija
DeinstitucionalizacijaDeinstitucionalizacija
DeinstitucionalizacijaDejan Jeremic
 
Centar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadCentar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadDejan Jeremic
 
Podrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuPodrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuDejan Jeremic
 
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Dejan Jeremic
 
Forenzička revizija
Forenzička revizijaForenzička revizija
Forenzička revizijaDejan Jeremic
 
Analiza ljudskih potencijala
Analiza ljudskih potencijalaAnaliza ljudskih potencijala
Analiza ljudskih potencijalaDejan Jeremic
 
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneSelekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneDejan Jeremic
 
Razvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoRazvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoDejan Jeremic
 

More from Dejan Jeremic (20)

Konferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicKonferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja Ilic
 
Konferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicKonferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan Djurdjevic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićKonferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda Milenković
 
Konferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicKonferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana Simic
 
Asistivna tehnologija
Asistivna tehnologija Asistivna tehnologija
Asistivna tehnologija
 
Podrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaPodrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosa
 
Beskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaBeskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog rada
 
Lokalne usluge GCSR Beograd
Lokalne usluge  GCSR BeogradLokalne usluge  GCSR Beograd
Lokalne usluge GCSR Beograd
 
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataPostupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
 
Deinstitucionalizacija
DeinstitucionalizacijaDeinstitucionalizacija
Deinstitucionalizacija
 
Centar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadCentar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi Sad
 
Podrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuPodrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvu
 
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
 
Forenzička revizija
Forenzička revizijaForenzička revizija
Forenzička revizija
 
Analiza ljudskih potencijala
Analiza ljudskih potencijalaAnaliza ljudskih potencijala
Analiza ljudskih potencijala
 
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneSelekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
 
Razvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoRazvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada Pancevo
 

Recently uploaded

High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024Energy for One World
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...Delhi Call Girls
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.Christina Parmionova
 

Recently uploaded (20)

High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
GFE Call Girls Service Indira Nagar Lucknow \ 9548273370 Indian Call Girls Se...
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
 

Gorjan Damjanovic

Editor's Notes

  1. Poštovane Dame i Gospodo, Dobar dan. Moje ime je Gorjan Damjanović i dolazim iz organizacije za zabranu hemijskog naoružanja, OPCW., Den Haag, Nizozemska. It sigurnost u vladinim i medjunarodnim internacionalnim organizacijama je tema ovog rada kojeg cu prezentovati u narednih 15tak minuta. Nadam se da ce vam prezentacija biti zanimljiva i donekle edukativno poučna. Zahvaljujem vam se unaprijed na praćenju i slušanju.
  2. Cybersecurity u današnjem dobu predstavlja najveći izazov sa kojim se susreću svi korisnici interneta kako vladine ustanove i organizacije, tako i internacionalne organizacije, čiji su osnivači same zemlje članice te organizacije, bilo da je riječ o organizacijama regionalnog, kontinentalnog ili interkontinentalnog nivoa. Kako je sam Internet "živa materija" i mijenja se i unapređuje na dnevnoj bazi, gdje možemo reći da ta dnevna baza nekad predstavlja veliki vremenski period, tako i osiguravanje sigurnog korištenja Interneta, i IT mreže predstavlja veliki izazov za stručne IT sigurnosne službe svake organizacije. Na žalost, legislativa, organizacija i institucija, koja treba da prati izazove današnjice, i sigurnog korištenja Interneta je prilično usporena samim načinom sprovođenja svojih odluka, koje su najčešće vatrogasnog kataktera. Dinamika razvoja interneta i IT tehnologija, njegove dobrobiti i opasnosti, mora biti shvaćena najozbiljnije na isti način, istom dinamikom, od strane voditelja tih istih organizacija i institucija što do sada u najvećem broju i nije bio slučaj. O tome ćemo obratiti posebnu pažnju u nastavku.
  3. Za razliku od privatnih Internet korisnika, gdje svaki individualni korisnik sam snosi odgovornost i posljedice korištenja Interneta, Internet u organizacijama i institucijama predstavlja, kao i kod svakog poslovnog sistema, izazov, koji zahtjeva ekonomsko političko razumjevanje od strane upravljačkog tijela te iste organizacije ili institucije. Razumjevanje se sastoji prvenstveno od svjesnosti da Internet i sva komunikacija koja se obavlja preko njega zahtjeva resurse. Osim IT menadžera koji to na pravilan i ozbiljan način trebaju predstaviti izvršnom menadžmentu, Internet i kompletan mrežni sistem organizacije koji najčešće predstavljaju jedan složeni sistem, treba biti shvaćen od strane menadžmenta kao poseban i složeni sistem a ne trošak koji se dešava jednom ili drugim riječima "kupi i zaboravi" sa nadom da ce raditi sam od sebe. Na žalost, IT menadžeri se prečesto susreću sa ne razumjevanjem od strane njihovih šefova upravo zbog ne poznavanja ili ne pravilnog prezentovanja tog složenog sistema
  4. Prijetnje koje dolaze od vanjskog dijela mreze ili interneta su odavno već svrstane u tri glavne grupe: 1. Spam 2. Viruses and Malware 3. Phishing Scams Svaka od ovih prijetnji za mrežu i korisnike su posebna tema za sebe tako da ćemo ih samo spomenuti.  
  5. Primjer problema potencijalnih, namjernih I ne namjernih unutrašnjih napada Ljudski doprinos ugrožavanju mreže Donošenje bilo kakvog oblika prenosnih memorijskih uredjaja u organizaciju je jedan od glavnih rizika za mrežu. Iako je ovo spomenuto bezbroj puta, čini se da nikad neće biti dovoljno, jer se bez obzira na stalna upozorenja dešavaju iste greške i propusti. Ovo su dva najčešća problema koja se javljaju u skoro svim institucijama; 1. Krajnji korisnik donese usb memorijsku karticu i bez problema se priključi na kompjuter/mrežu. 2. Korisnik donosi laptop i priključuje se na mrežu. Takođe, osim ove dvije najčešće situacije, jedan od stalnih problema su ‘pojava’ perifernih uređaja koji se ponašaju kao multi mašine, su glavni rizik na samoj mreži. Firewall je , koa primjer, jedno od riješenja sigurnosnih sistema ali se ne možemo osloniti samo na njega ili samo na jednu vrstu sistema. Na primjer, firewall će blokirati sniffing napade ali ako nema enkripcije samih podataka koji fluktiraju mrežom postoji veliki rizik od njihovog presretanja.
  6. Ovdje je riječ naravno o hardwerskim i softwerskim rješenjima koja zahtjevaju konstantan monitoring, održavanje, upgrade (nadogradnju) i po potrebi zamjenu.
  7. Ovdje je riječ o ljudima koji predstavljaju odane profesionalce koji posjeduju sigurnosne certifikate poput CISSP (Certified Information Systems Security Professional) i CISM (Certified Information Security Manager). Treba naglasiti da u državnim i vladinim te internacionalnim organizacijama treba izbjegavati popularni outsourcing (bez obzira na pravno snažnim ugovorima o tajnosti koje vanjske kompanije obećavaju) jer je riječ o uglavnom osjetljivim i često informacijama koje nisu za javnost a pogotovo nisu informacije za strane države.
  8. Iako su proizvođači HW i SW rješenja u principu privatne kompanije to ne znači da se na njih treba apsolutno osloniti i to prvenstveno iz dva razloga. Prvi je da se te kompanije, koje se bave pisanjem kompjuterskih kodova, proizvodnjom HW na kojima ti kodovi rade te kompanije koje daju informacije prenosa podataka i one koje izgrade i "održavaju" odnosno prate i bave se prevencijom napada na interne mreže, ne daju garanciju ili osiguranje na samo korištenje istih, koliko to god čudno zvučalo. To pravno ograničavanje ide toliko daleko da ne preuzimaju odgovornost za gubitak podataka čak i ako su na neki način i te kompanije odgovorne zbog toga što su ti isti kodovi pisani nemarno, te u cijelom procesu proizvodnje, nisu čak ni pokušavali otkloniti nedostatke. Svu nastalu štetu na kraju preuzima krajnji korisnik. Drugi razlog je da, iako su te kompanije privatnog karaktera ipak nisu u stopostotnom obliku nezavisne od uticaja vlada i institucija država na čijem se teritoriju nalaze. Najlakši primjer koji možemo navesti su dvije vodeće kompanije, koje se bave proizvodnjom anti virusnih rješenja, Mcafee i Kaspersky. U svakom slučaju trebaju se odabrati sigurnosna rješenja i oprema koja je najstabilnija, najkvalitetnija i najoptimalnija, bez favoriziranja pojedinih kompanija ali takođe izbjegavati polu rješenja i nepoznate kompanije samo radi prezentacije uštede menadžmentu. U prezentaciji menadžmentu glavnu ulogu trebaju imati IT menadžeri tih istih organizacija gdje će isti prvenstveno imati u vidu interes i dobrobit same institucije, te dosljedno predstavljati sigurnosni sistem u cjelini.  
  9. Ovdje se moramo osvrnuti ponovo na IT profesionalce koji u svakom slučaju moraju biti sastavni dio te institucije ili organizacije te predstavljati prvu i zadnju liniju odbrane I zaštite podataka I informacija, ili elektronskog protoka informacija. Ne treba previše naglašavati koliko su informacije koje postoje u vladinim i internacionalnim instiucijama važne i u velikoj većini osjetljive prirode za pojedinu državu ili više njih.  U samom odabiru rješenja treba izbjegavati gotova sigurnosna rješenja i oslanjanje na samo jednu kompaniju ili u slučaju internacionalnih organizacija na kompanije koje dolaze iz samo jedne države članice. Takva rješenja u većini slučajeva, sa sigurnošću možemo reći, da neće proći, jer ce doći do otpora drugih država članica, što zbog političkih a takođe i ekonomskih razloga. Iz ovoga možemo izvući zaključak da IT profesionalci moraju uzeti u obzir i politički aspekt svojih sigurnosnih rješenja što svakako predstavlja dodatni izazov.  
  10. Jedan od vrlo važnih faktora kod svakog sigurnosnog sistema je i razumjevanje potreba od strane it menadžera, njegova svjesnost i upoznatost sa kompletnim sistemom, ali i osnovno znanje. To osnovno, temeljno znanje je preduslov za razumjevanje potencijalnih problema. Na žalost rijetki IT menadžeri ga posjeduju, jer se uglavnom fokusiraju na aplikacioni nivo, a to ih onda dovodi, skoro nesvjesno, na nivo krajnjeg korisnika. Takođe, čest je slučaj da njihovo ne poznavanje same materije ili sistema i fokus na ekonomskom aspektu ,vođenja odjela organizacije, jako bitnog u današnjem svijetu, dovede do fatanih grešaka koje se mogu odraziti pogubno na cijelu kompaniju/organizaciju. Pokušavajući, kao i svaki novi menadžer u novom okruženju, da donesu nove ideje i da impresioniraju izvršni menadžment, a bez da prije toga izvrše evaluaciju postojećeg stanja i potencijalnih mogućnosti često završavaju svoju potencijalo uspješnu karijeru i prije nego je počela. Sve češće se može primjetiti postojanje CIO (Chief Information Officer) osobe u organizaciji, koja je zadužena i odgovorna za donošenje odluka ali i predlaganje mape puta (road map) organizacije.
  11. U ovom slajdu možemo vidjeti 8 Osnovnih metoda zaštite i mjera zaštite koje bi se trebali pridržavati sve državne organizacije ili međunarodne institucije Svaka od ovih metoda predstavlja temu za sebe tako da cemo ih samo spomenuti.
  12. Važno je napomenuti da jedan od bitnih faktora spriječavanja mogućih incidenata na mreži je takođe osim kvalifikovanih IT stručnjaka i svjesnost, edukacija i trening (awareness, education and training) samih korisnika u periodičnim ciklusima te ovisno o procjenama potencijalnih opasnosti od strane IT menadžera same institucije ili organizacije. Uzimanje korištenja Interneta ‘zdravo za gotovo’ od krajnjih korisnika, pogotovo u organizacijama gdje se ti isti korisnici oslanjaju na sigurnosne sisteme same organizacije, često dolazi do iznenađenja kada se pojave problemi i zbog ne upućenosti, ne znanja, ne obavještenosti te manjka treninga. Nije rijedak slučaj standardnog i često viđenog optuživanja it stručnjaka od strane krajnjih korisnika koja su donekle u pravu. Bolje spriječiti i ograničiti nego popravljati Čak i u slučaju da ispadaju bad people Krajnje korisnike predstaviti kao potencijalne nesvjesne ili namjerne unutrasnje napadace,  Iako je Internet relativno mlad, malo više od 20 godina, brzina njegovog razvoja i expanzija, kao i opasnosti koje su popratni efekat za njegove korisnike, kao takva tehnologija, nije zabilježen u ljudskoj istoriji. Još uvjek se može reći da je jezičak vage na strani dobrobiti čovječanstva ali koliko je blizu samoj šteti, većina korisnika nije svjesna.