Kriminalitet u kibernetskom prostoru. Suvremene oblike. Igor Bernik, Univerza v Mariboru , Fakulteta za varnostne vede. Informacijska ili kibernetska sigurnost. evolucija ili revolucija. Revolucija infrastrukture Eksplozija podataka
Igor Bernik, Univerza v Mariboru, Fakultetazavarnostnevede
evolucija ili revolucija
u modernom svjetu
Cybercrime is the use of information technology to carry criminal acts.
To ensure protection against cyber criminals, to reduce endangerment and avoid possible consequences, it is important to adhere to the following basic guidelines:
Informing and educating about the dangers of cyber crime must become widespread, common and continuous at all level of society.
Users will know how to use this technology rationally and responsible, and will not be afraid of it.
Lack of understanding translates into inadequate security.
poznato ili novo dogadganje
Information warfare = warfare for information power.
Right information are basic capital of arganization!?
Military, state, organizational and NGOs.
STATE IW CORPORATE IW CIVIL IW
Espionage (Echelon) Harassment Cyber terrorism
Kinetic war (NCW, GIG) Industrial espionage Hacktivism
Information operations ECD
Propaganda Animal, environment
1. Information security politics should consider ISO standards.
2. Implementation of latest technology.
3. National strategy of information (cyber) security.
4. Mandatory information security standards for all organizations.
5. Safety classifications of valuable information.
6. International cooperation.
1. Universal definition.
2. Definition of acceptable usage of ICT.
3. International harmonization.
4. Abolish legal constraints.
5. Trained law agencies.
1. Business ethics.
2. Security awareness.
3. Data classification and personal limitation.
4. Risk management and uninterrupted business.
Further research: understanding, protection.
šta je kibernetskog u terorizmu
Cyber Terrorism causing fear, damage or even death using attack with the enterprise IS influencing the (global) society and media attention.
Difference with classic form of terrorism:
Difference is also seen in the usage of computers - at the moment computers are used as a support for planning and executing classical terrorist attacks- that will change in the future.
The most exposed critical areas: information and communications, electrical network, gas and oil (storage, transport, extraction), banking and finances, transport, water supply systems, government services. We must physical separate critical IS from internet.
Cybercrime and terrorism are unavoidable threats. What can we do?