| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document

Title:Usposabljanje oboroženih sil v boju proti kibernetskim grožnjam : diplomsko delo visokošolskega strokovnega študija Varnost in policijsko delo
Authors:Cimprič, Aleksandra (Author)
Markelj, Blaž (Mentor) More about this mentor... New window
Bernik, Igor (Co-mentor)
Files:.pdf VS_Cimpric_Aleksandra_2015.pdf (956,59 KB)
 
Language:Slovenian
Work type:Bachelor thesis/paper (mb11)
Typology:2.11 - Undergraduate Thesis
Organization:FVV - Faculty of Criminal Justice and Security
Abstract:Živimo v obdobju informacijske družbe, kjer sta vojaško in civilno področje vse bolj odvisna od IKT in procesov povezanih z njo, ker je večina komunikacijskih sistemov računalniško nadzorovanih. Vsiljivci ne izbirajo katere računalnike bodo napadli. Večinoma skušajo pridobiti nadzor nad računalnikom, da bi lahko izvedli napade na druge računalniške sisteme. S tem, ko pridobijo nadzor, imajo možnost, da skrijejo lokacijo, od koder izvajajo napad. V večjih primerih so tarče pomembnejši računalniški sistemi, kot so na primer vladni sistemi, finančni in bančni sistemi. Večina ciljev je povezanih s kriminalom. Vsiljivci imajo vpogled v naše aktivnosti na računalniku, lahko pa tudi sprožijo spremembe podatkov na trdem disku, ali v primeru, če vdrejo v sisteme vodenja in poveljevanja ali nadzora nad oboroženimi sistemi vojske lahko aktivirajo orožja za napad. Potrebno je spoznati nevarnosti in tveganja, ki nam jih prinaša kibernetsko okolje. S tem, ko objavljamo slike, video posnetke na spletna omrežja, privabljamo napadalce. V kolikor damo na splet svoje osebne podatke, jih ne moremo več izbrisati. Na področjih, kjer je potrebno skrbeti za tajne podatke, je potrebno vzpostaviti celovit sistem za varovanje teh podatkov (Sklep Sveta, 2013). »Pomembnost področja kibernetske varnosti omrežij odraža tudi raven pozornosti in prisotnost le te problematike na najvišjih, strateških ravneh odločanja in načrtovanja« (Varna Evropa v boljšem svetu, 2003:2, po Dokl, 2012). Kibernetska varnostna strategija omenja kibernetsko varnost kot ključni element varovanja informacijske infrastrukture. Kibernetska varnost je prepoznana kot ena od ključnih globalnih groženj in izzivov.
Keywords:kibernetski prostor, kibernetska kriminaliteta, grožnje, kibernetsko bojevanje, oborožene sile, vojska, usposabljanje, informacijska varnost, taktični komunikacijski sistemi, diplomske naloge
Year of publishing:2015
Year of performance:2015
Place of performance:[Ljubljana
Publisher:A. Cimprič]
Number of pages:48 str.
Source:[Ljubljana
UDC:343.3/.7:004(043.2)
COBISS_ID:3027434 Link is opened in a new window
NUK URN:URN:SI:UM:DK:N2BDDAV5
Views:525
Downloads:176
Metadata:XML RDF-CHPDL DC-XML DC-RDF
Categories:FVV
:
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:AddThis
AddThis uses cookies that require your consent. Edit consent...

Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Secondary language

Language:English
Title:Military training in combating cybernetic threats
Abstract:We live in the period of information society, where the military and civil area increasingly depend on ICT and the processes associated with, since most of the communication systems are computer controlled. The invaders don't choose which computers will be attacked. They trying to gain control of the computer, to be able to carry out attacks on other computer systems. When they gain control, they have the option to hide the location from where it carried out the attack. In the larger cases the target are important computer systems such as government systems, financial and banking systems. Most of the objectives are associated with the crime. The invaders can have insight into our activities on the computer, but can also trigger a change to the data on your hard disk drive. In case of control over weapons systems they can trigger weapons. It is necessary to know the hazards and risks to which we are brought from the cyber environment. When we publish on the web network we attrack the invaders. If we placed our personal data on the internet, this can't be erased. In areas where the necessary care for confidential information, it's necessary to establish a comprehensive system for the protection of these data (Decision of the Council, 2013). » The importance of the cyber security also reflects the level of attention and the presence of only at the highest, strategic levels of decision-making and planning« ( The European Security Strategy, 2003:2, to Dokl, 2012). Cyber security is recognized as one of the key global threats and challenges.
Keywords:cyber warfare, cyber security, Slovenian armed forces, Nato, tactical communication system, network intrusion


Comments

Leave comment

You have to log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica