"EYES WIDE OPEN" – ONE OF THE FUNDAMENTALS OF INFORMATION SECURITY
This paper presents an original scientific contribution through the comprehensive application of the case study methodology in analyzing the evolving cyber threats that shape information security in the 21st century. Rather than relying on a descriptive or review-based approach, the paper introduces a clear scientific structure with defined criteri...
By Alen Kamiš, Aleksandar Zakic, Marko Zakić, Nemanja Deretic
WAVELET TRANSFORMATION WITH EXAMPLES
This paper presents Wavelet transformation in image and signal processing. Wavelet (small wave) is used as a principle by which various programming and engineering tasks are solved with the main goal of improving the shortcomings of the Fourier transformation in terms of data compression, image processing, computer graphics, signals and other...
By Alen Kamiš, Aleksandar Zakić, Saša Kukolj, Nemanja Deretić
DEFENSE-IN-DEPTH OF MODERN RADIO SYSTEMS
A purpose of this paper is to present the Defense-in-depth strategy for the protection of the information system, in this case of modern radio systems. It will explain the basic terms and systems of modern radio systems and how to implement them. Also, this paper will explain the basic concepts of radio communication systems, concepts of mobi...
By Alen Kamiš, Negovan M. Stamenković
ESTABLISHING SECURE COMMUNICATION USING SSL VPN
A following text represents a real life sample and as such it has a large possibility for use and everyday life. By setting up SSL-VPN connection, users can have access to local resources (LAN). SSL-VPN uses safe connections and creates a “safe tunnel” for clients to communicate from outside of local network to the local user netw...
By Alen Kamiš
CREATING CLOUD BASED WEBRTC VOICE OVER IP APPLICATIONS FOR WIRED AND WIRELESS USERS
This document presents a sample of building a Web application which is used for „Voice over IP – VoIP„ calls, internal and external to the company. The application enables wired and wireless users to access “live” voice and video communications based on the webRTC technology. Containers (micro services) were used...
By Alen Kamiš
METHODOLOGICAL BASIS OF DESIGNING, IMPLEMENTATION AND ADMINISTRATION IOT
Following text represents all methodological phases through which a single project of implementing an IT system should be taken through. A theme specifically is describing all methodological phases with practical examples during design, implementation and maintenance of the Internet of Things (IoT) system. Author's own work was used called &b...
By Alen Kamiš
CYBER ATTACK AND THREAT PROTECTION
This paper covers technologies needed for protection of an IT System. Cyber attacks are more frequent then ever and lots of attention should be given to protection from these attacks. This paper covers basis of protecting an IT system and data. In today's business a competitiveness is maintained mainly by high quality back-office processes an...
By Alen Kamiš