VARIOUS TYPES OF CYBER THREATS

  • Ivana Luknar Institut za politicke studije
  • Filip Jovanović Fakultet za projektni i inovacioni menadžment
Ključne reči: сајбер претње, сајбер напад, сајбер тероризам, сајбер криминал, сајбер безбедност, сајбер одбрана

Sažetak


Безбедност интернета и онлајн комуникација постали су један од суштинских изазова садашњице. У раду се разматрају различите врсте сајбер претњи као што су: сајбер напад, сајбер тероризам и сајбер криминал. Појединци, компаније и државе се готово свакодневно у свом раду и комуникацији ослањају на функционисање информационо-комуникационих технологија (ИКТ). Сврха студије је да се укаже на значај безбедности информационо-комуникационих технологија, указивањем на различите врсте сајбер претњи које могу да настану услед примене ИКТ и да изазову озбиљне последице. Приликом истраживања научне грађе на поменуту тему примењене су различите методе: индуктивна и дедуктивна метода, аналитичко-синтетичка метода, хипотетичко-дедуктивни метод и метода анализе садржаја. Резултати студије указују на потребу за континуираним и активним праћењем свих врста сајбер претњи. Намера ове студије је да информише јавност поводом овог проблема и подигне свест о евентуалним сајбер претњама унутар друштва. Налази студије доприносе проширивању знања у овој области истраживања.

Reference

Abraham, Sherly, Chengalur-Smith, InduShobha. 2010. “An overview of social engineering malware: trends, tactics, and implications.” Technology in Society 32: 183–196.


Bahtiyar, Serif, Cag˘layan, U. Mehmet. 2013. “Security similarity based trust in cyber space.” Knowledge-Based Systems 52: 290–301.


Basseville, Michele, Nikiforov V. Igor. 1993. Detection of abrupt changes: theory and application. Vol. 104. New Jersey: Prentice Hall Englewood Cliffs. http://people.irisa.fr/Michele.Basseville/kniga/kniga.pdf


Bennet, T. Brian. 2017. Understanding, Assessing, and Responding to Terrorism. Protecting Critical Infrastructure and Personnel, 2nd Edition, Wiley. 


Blondel, D. Vincent, Guillaume, Jean-Loup, Lambiotte, Renaud, Lefebvre, Etienne. 2008. “Fast unfolding of communities in large networks.” Journal of Statistical Mechanics: Theory and Experiment 10: P10008. http://dx.doi.org/10.1088/1742-5468/2008/10/P10008


Boobier. Tony. 2020. AI and the Future of Banking, Hoboken,New Jersey: John Wiley & Sons Ltd.


Branscomb, Lewis. 2004. “Protecting civil society from terrorism: the search for a sustainable strategy.” Technology in Society 26: 271–285.


Byrne DJ, Morgan, David, Tan, Kymie, Johnson, Bryan, Dorros, Chris. 2014. “Cyber Defense of Space-Based Assets: Verifying and Validating Defensive Designs and Implementations.” Procedia Computer Science 28: 522 – 530.


Canaan, Bushra, Colicchio, Bruno, Abdeslam, Dj. Ould. 2020. “Microgrid Cyber-Security: Review and Challenges toward Resilience.” Sustainability 2020: 5649.


Choo, R., Kim-Kwang, 2011. “The cyber threat landscape: Challenges and future research directions.” Computers & Security 30 (8): 719-731.


Croitoru, Arie, Wayant, N.; Crooks, A.; Radzikowski J.; Stefanidis, A. 2015. “Linking cyber and physical spaces through community detection and clustering in social media feeds”. Computers, Environment and Urban Systems 53: 47–64.


Europ Assistance. 2019. “Nearly Half of consumers concerned about cyber risks.” 13.2.2019. https://webcache.googleusercontent.com/search?q=cache:H9xV_7j85VoJ:https://www.europ-assistance.com/wp-content/uploads/2021/02/1549968385135.pdf&cd=1&hl=sr&ct=clnk&gl=rs


Fooladivanda, Dariush, Hu, Qie, Chang, H. Young, Sauer, W. Peter. 2019. “Secure State Estimation and Control for Cyber Security of AC Microgirds.” arXiv 2019, arXiv:1908.05843. https://arxiv.org/abs/1908.05843


Fortunato, S.; Castellano, C. 2007. “Community Structure in Graphs.” In Chapter of Springer's Encyclopedia of Complexity and System Science, ed. Robert Meyers, 1141-1163. New York, NY: Springer. https://doi.org/10.1007/978-0-387-30440-3_76


Henson, Billy, Reyns, W. Bratfors, and Fisher, S. Bonnie. 2016. “Cybercrime Victimization.” In The Wiley Handbook on the Psychology of Violence; eds. Carlos A. Cuevas, Callie Marie Rennison, 554-570. Hoboken, New Jersey: John Wiley & Sons Ltd.


Hinduja, Sameer, Patchin W. Justin. 2010. “Bullying, cyberbullying, and suicide.” Archives of Suicide Research 14: 206–221.


Holt, J. Thomas. 2016. “Cybercrime.” In The Handbook of Measurement Issues in Criminology and Criminal Justice, eds. Beth M. Huebner, Timothy S. Bynum, 29-48, Hoboken, New Jersey: John Wiley & Sons Ltd.  


Jansson, Kenny Olof Robert, Solms von Rossouw 2010. “Social Engineering: Towards A Holistic Solution.” In Human Aspects of Information Security Assurance. Proceedings of the South African Information Security Multi-Conference (SAISMC), eds. Nathan Clarke, Steven Furnell, Rossouw von Solms, 23-34. South Africa: Port Eliyabeth. https://www.cscan.org/?page=openaccess&eid=12&id=185


Jiao, Qiang, Modares, Hamidreza, Lewis, L. Frank, Xu, Shengyuan, Xie, Lihua. 2016. “Distributed α2-gain output-feedback control of homogeneous and heterogeneous systems.” Automatica 71: 361–368.


Luknar, Ivana. 2020. “Cybercrime – Emerging Issue.” In Archibald Reiss Days, Vol. 10, ur. Stevo Jaćimovski, 621- 628. Beograd: Kriminalističko-policijski univerzitet.


Luknar, Ivana. 2022. Social control theory and cybercrime.” Nacionalni interes 41(1): 147-159. https:doi.org//10.22182/ni.4112022.7


Mamdouh Khalil, S., Bahsi, H., Ochieng’ Dola, H., Korõtko, T., McLaughlin, K., & Kotka, V. 2023. “Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System.” Computers & Security 124: 102950. https://www.sciencedirect.com/science/article/pii/S016740482200342X


Mitchell, J. Kimberly, Finkelhor David, Becker-Blease A. Kathyn. 2007. “Linking youth internet and conventional problems: Findings from a clinical perspective.” Journal of Aggression, Maltreatment and Trauma 15: 39–58.


Mitnick D. Kevin, Simon L. William, Wozniak, Steve. 2002. The art of deception: controlling the human element of security. Hoboken, New Jersey: Wiley & Sons. https://www.wiley.com/en-us/9780471237129


Mo, Yilin, Chabukswar, Rohan, Sinopoli, Bruno. 2014. “Detecting integrity attacks on SCADA systems.” IEEE Transactions on Control Systems Technology 22 (4): 1396–1407.


Parker, Amanda M. Sharp. 2010. “Cyberterrorism: The Emerging Worldwide Threat.” In The Faces of Terrorism: Cross Disciplinary Explorations, ed. David Canter, 245-255, USA: Wiley-Blackwell Publishing.


Priyadarshini, Ishaani, Kumar, Raghvendra, Sharma, Rohit, Kumar Singh, Pradeep, Satapathy, C.Suresh. 2021. “Identifying cyber insecurities in trustworthy space and energy sector for smart grids.” Computers and Electrical Engineering 93: 107204.


Rago, M., Hosmer, C. 2013. Data hiding. Amsterdam, The Netherlands: Elsevier/Syngress.


Reich, Walter. 1990. “Understanding terrorist behaviour: the limits and opportunities of psychological inquiry.” In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich, 261-280. New York: Cambridge University Press.


Renda, Andrea. 2019. Artificial Intelligence. Ethics, governance and policy challenges, Brussels, Belgium: Centre for European Policy Studies (CEPS).


Rogers, Marc. 2003. “The Psychology of Cyber-terrorism.” In Terrorists, Victims, and Society: Psychological Perspectives on Terrorism and Its Consequences; ed. Andrew Silke, 77-92, Chichester: Wiley.


Siponen, T. Mikko 2000. “A conceptual foundation for organizational IS security awareness.” Information Management & Computer Security 8: 31–4.


Sunde, Marie Inger. 2018. “Cybercrime Law.” In Digital Forensics, ed. Andre, Arnes, 51-116. Hoboken, New Jersey: John Wiley & Sons Ltd.


Symantec. 2010. “Norton cybercrime report: The human impact Reveals Global Cybercrime Epidemic and Our Hidden Hypocrisy.” 8 September 2010. https://community.norton.com/en/blogs/symantec-cyber-education/norton%E2%80%99s-cybercrime-report-human-impact-reveals-global-cybercrime


Yannakogeorgos, A. P. The Newest Security Threat: Cyber-Conflict. In Local Planning for Terror and Disaster: From Bioterrorism to Earthquakes; Cole, A. L., Connell, D. N., Ed.; Wiley‐Blackwell 2012, pp. 227-238.


Yue, On-Ching. 2003. “Cyber security.” Technology in Society 25: 565–569.


Zhuge, Hai. 2011. “Semantic linking through spaces for cyber-physical-socio intelligence: A methodology.” Artificial Intelligence 175: 988–1019.


Лукнар, Ивана. 2022. Сајбер тероризам: мере за сузбијање и превенција, Београд: Институт за политичке студије

Objavljeno
2024/02/06
Rubrika
Članci