×
Home Current Archive Editorial board
News Contact
Review article

CYBER ATTACK, TYPES OF CYBER ATTACK AND ADEQUATE PROTECTION OF DATA AND USERS

By
Nehad Gaši ,
Nehad Gaši

International University of Travnik,

Dina Vrebac ,
Dina Vrebac

International University of Travnik,

Amira Trako
Amira Trako

Internacionalni Univerzitet Travnik u Travniku, Travnik, Bosnia

Abstract

Today we are witnessing a time in which even wars in the world between different states are taking place in a digital format. In today's environment where the number of cyberattacks is constantly growing, no one can rely on traditional protection such as antivirus software and malware detection software anymore. Cybercrime includes a set of criminal offenses where computers, computer networks, computer data, as well as their products in material and electronic form are used as the object of execution and as a means of committing the crime. It became clear that the installed anti-virus program does not guarantee the complete security of the user or the information system. First of all, the question arises whether all computers and devices are properly protected by the latest version of the antivirus program. Just continuously monitoring the coverage of the endpoint environment is very challenging for IT administrators. Even if there is installed antivirus software with the latest update of virus detection, detection and prevention of sophisticated attacks are additional challenges. As a rule, IT administrators who are responsible for the maintenance and security of the System, will not get an immediate insight into what is happening or a historical overview of what happened during a security attack.

Citation

Authors retain copyright. This work is licensed under a Creative Commons Attribution 4.0 International License. Creative Commons License

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.