{"id":594,"date":"2022-04-27T12:40:09","date_gmt":"2022-04-27T10:40:09","guid":{"rendered":"https:\/\/www.absolutsupport.rs\/en\/?page_id=594"},"modified":"2022-04-27T12:44:18","modified_gmt":"2022-04-27T10:44:18","slug":"ict-system-security","status":"publish","type":"page","link":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/","title":{"rendered":"ICT system security"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_padding=&#8221;30&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]Pursuant to the Law on Information Security (&#8220;Official Gazette of RS&#8221;, No. 6\/2016, 94\/2017 and 77\/2019), Article 6a, the obligations of <strong>ICT system operators of special importance are that<\/strong>:<\/p>\n<ol>\n<li>enter the ICT system of special importance which it manages in the records of the operator of the ICT system of special importance.<\/li>\n<li>take measures to protect ICT systems of special importance.<\/li>\n<li>adopt an act on the security of the ICT system.<\/li>\n<li>checks the compliance of the applied measures for the protection of the ICT system with the act on the security of the ICT system at least once a year.<\/li>\n<li>regulate the relationship with third parties in a way that ensures the undertaking of measures for the protection of that ICT system in accordance with the law, if it entrusts activities related to the ICT system of special importance to third parties.<\/li>\n<li>submits notifications on incidents that significantly endanger the information security of the ICT system.<\/li>\n<li>provide accurate statistics on incidents in the ICT system.<\/li>\n<\/ol>\n<p><strong>The ICT System Security Act<\/strong> covers all protection measures provided by the Law on Information Security, the Decree on Detailed Content of the ICT System Security Act of Special Importance, Manner of Verification and Content of ICT System Security Verification Report of Special Importance and the Decree on Detailed Regulation of ICT System Protection Measures of special importance.<\/p>\n<p>When drafting the Act, it is necessary to define the actual state of the security system and harmonize the current state with the recommendations and standards provided by the Law and Regulations. It recommended that the obligatory members of the working group that will work on the drafting of the Act be lawyers and technical persons, system administrators.<\/p>\n<p>It is important to point out that the Security Act is a document that is extremely subject to change, and its provisions need to regularly reviewed and checked, all to create the most advanced level of security and build awareness of employees and those responsible about the importance of ICT information security.<\/p>\n<p><strong>The objectives of the ICT System Security Act are:<\/strong><\/p>\n<ul>\n<li>determining the manner and procedure for achieving and maintaining an adequate level of security system.<\/li>\n<li>preventing and mitigating the consequences of an incident that compromises or compromises the security of information.<\/li>\n<li>raising awareness among employees about the importance of information security, risks and protection measures when using ICT systems.<\/li>\n<li>prescribing the powers and responsibilities of employees regarding the security and resources of the ICT system.<\/li>\n<li>overall improvement of information security and verification of compliance with the application of protection measures.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;]<div class=\"nectar-social fixed\" data-position=\"left\" data-color-override=\"override\"><a href=\"#\"><i class=\"icon-default-style steadysets-icon-share\"><\/i><\/a><div class=\"nectar-social-inner\"><a class='facebook-share nectar-sharing' href='#' title='Share this'>  <i class='fa fa-facebook'><\/i> <span class='social-text'>Share<\/span> <\/a><a class='twitter-share nectar-sharing' href='#' title='Share this'> <i class='fa icon-salient-x-twitter'><\/i> <span class='social-text'>Share<\/span> <\/a><a class='linkedin-share nectar-sharing' href='#' title='Share this'> <i class='fa fa-linkedin'><\/i> <span class='social-text'>Share<\/span> <\/a><\/div><\/div>[vc_column_text]\n\n<div class=\"kk-star-ratings kksr-shortcode\"\n    data-payload='{&quot;id&quot;:&quot;594&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;shortcode&quot;,&quot;align&quot;:&quot;&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;1&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;valign&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;Rate this page&quot;,&quot;legend&quot;:&quot;5\\\/5 - (1 vote)&quot;,&quot;size&quot;:&quot;24&quot;,&quot;title&quot;:&quot;ICT system security&quot;,&quot;width&quot;:&quot;142.5&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 142.5px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 19.2px;\">\n            5\/5 - (1 vote)    <\/div>\n    <\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_content&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_zigzag color=&#8221;custom&#8221; custom_color=&#8221;#124569&#8243;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_padding=&#8221;30&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221;&#8230;<\/p>\n","protected":false},"author":2,"featured_media":595,"parent":15,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-594","page","type-page","status-publish","has-post-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ICT system security - Absolut Support Belgrade - Serbia<\/title>\n<meta name=\"description\" content=\"The ICT System Security Act covers all protection measures provided by the Law on Information Security in Serbia.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ICT system security - Absolut Support Belgrade - Serbia\" \/>\n<meta property=\"og:description\" content=\"The ICT System Security Act covers all protection measures provided by the Law on Information Security in Serbia.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Absolut Support Belgrade - Risk Assessment, Security Consulting Serbia\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-27T10:44:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/\",\"url\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/\",\"name\":\"ICT system security - Absolut Support Belgrade - Serbia\",\"isPartOf\":{\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg\",\"datePublished\":\"2022-04-27T10:40:09+00:00\",\"dateModified\":\"2022-04-27T10:44:18+00:00\",\"description\":\"The ICT System Security Act covers all protection measures provided by the Law on Information Security in Serbia.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#primaryimage\",\"url\":\"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg\",\"contentUrl\":\"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg\",\"width\":1920,\"height\":1467,\"caption\":\"ICT system security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Po\u010detna\",\"item\":\"https:\/\/www.absolutsupport.rs\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk assessment\",\"item\":\"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ICT system security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/#website\",\"url\":\"https:\/\/www.absolutsupport.rs\/en\/\",\"name\":\"Absolut Support Belgrade - Risk Assessment, Security Consulting Serbia\",\"description\":\"Risk Assessment, Security Consulting Serbia\",\"publisher\":{\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.absolutsupport.rs\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/#organization\",\"name\":\"Absolut Support\",\"url\":\"https:\/\/www.absolutsupport.rs\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/absolut-support-beograd-procena-rizika.jpg\",\"contentUrl\":\"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/absolut-support-beograd-procena-rizika.jpg\",\"width\":800,\"height\":600,\"caption\":\"Absolut Support\"},\"image\":{\"@id\":\"https:\/\/www.absolutsupport.rs\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ICT system security - Absolut Support Belgrade - Serbia","description":"The ICT System Security Act covers all protection measures provided by the Law on Information Security in Serbia.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/","og_locale":"en_GB","og_type":"article","og_title":"ICT system security - Absolut Support Belgrade - Serbia","og_description":"The ICT System Security Act covers all protection measures provided by the Law on Information Security in Serbia.","og_url":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/","og_site_name":"Absolut Support Belgrade - Risk Assessment, Security Consulting Serbia","article_modified_time":"2022-04-27T10:44:18+00:00","og_image":[{"width":1920,"height":1467,"url":"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/","url":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/","name":"ICT system security - Absolut Support Belgrade - Serbia","isPartOf":{"@id":"https:\/\/www.absolutsupport.rs\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#primaryimage"},"image":{"@id":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg","datePublished":"2022-04-27T10:40:09+00:00","dateModified":"2022-04-27T10:44:18+00:00","description":"The ICT System Security Act covers all protection measures provided by the Law on Information Security in Serbia.","breadcrumb":{"@id":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#primaryimage","url":"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg","contentUrl":"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2022\/04\/ict-system-security.jpg","width":1920,"height":1467,"caption":"ICT system security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/ict-system-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Po\u010detna","item":"https:\/\/www.absolutsupport.rs\/en\/"},{"@type":"ListItem","position":2,"name":"Risk assessment","item":"https:\/\/www.absolutsupport.rs\/en\/risk-assessment\/"},{"@type":"ListItem","position":3,"name":"ICT system security"}]},{"@type":"WebSite","@id":"https:\/\/www.absolutsupport.rs\/en\/#website","url":"https:\/\/www.absolutsupport.rs\/en\/","name":"Absolut Support Belgrade - Risk Assessment, Security Consulting Serbia","description":"Risk Assessment, Security Consulting Serbia","publisher":{"@id":"https:\/\/www.absolutsupport.rs\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.absolutsupport.rs\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.absolutsupport.rs\/en\/#organization","name":"Absolut Support","url":"https:\/\/www.absolutsupport.rs\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.absolutsupport.rs\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/absolut-support-beograd-procena-rizika.jpg","contentUrl":"https:\/\/www.absolutsupport.rs\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/absolut-support-beograd-procena-rizika.jpg","width":800,"height":600,"caption":"Absolut Support"},"image":{"@id":"https:\/\/www.absolutsupport.rs\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/pages\/594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/comments?post=594"}],"version-history":[{"count":4,"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/pages\/594\/revisions"}],"predecessor-version":[{"id":597,"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/pages\/594\/revisions\/597"}],"up":[{"embeddable":true,"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/pages\/15"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/media\/595"}],"wp:attachment":[{"href":"https:\/\/www.absolutsupport.rs\/en\/wp-json\/wp\/v2\/media?parent=594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}