Изабери језик:
Тема броја




Безбедност интернета и онлајн комуникација постали су један од суштинских изазова садашњице. У раду се разматрају различите врсте сајбер претњи као што су: сајбер напад, сајбер тероризам и сајбер криминал. Појединци, компаније и државе се готово свакодневно у свом раду и комуникацији ослањају на функционисање информационо-комуникационих технологија (ИКТ). Сврха студије је да се укаже на значај безбедности информационо-комуникационих технологија, указивањем на различите врсте сајбер претњи које могу да настану услед примене ИКТ и да изазову озбиљне последице. Приликом истраживања научне грађе на поменуту тему примењене су различите методе: индуктивна и дедуктивна метода, аналитичко-синтетичка метода, хипотетичко-дедуктивни метод и метода анализе садржаја. Резултати студије указују на потребу за континуираним и активним праћењем свих врста сајбер претњи. Намера ове студије је да информише јавност поводом овог проблема и подигне свест о евентуалним сајбер претњама унутар друштва. Налази студије доприносе проширивању знања у овој области истраживања.

кључне речи:


    Abraham, Sherly, and InduShobha Chengalur-Smith. 2010. “An overview of social engineering malware: trends, tactics, and implications.” Technology in Society 32: 183–196.

    Bahtiyar, Serif, and U. Mehmet Cag˘layan. 2013. “Security similarity-based trust in cyber space.” Knowledge-Based Systems 52: 290–301.

    Basseville, Michele, and Igor Nikiforov V. 1993. Detection of abrupt changes: theory and application. New Jersey: Prentice Hall Englewood Cliffs.

    Bennet, T. Brian. 2017. Understanding, Assessing, and Responding to Terrorism. Protecting Critical Infrastructure and Personnel.  New Jersey: Wiley.

    Blondel, D. Vincent, Guillaume, Jean-Loup, Lambiotte, Renaud, and Etienne Lefebvre. 2008. “Fast unfolding of communities in large networks.” Journal of Statistical Mechanics: Theory and Experiment 10. doi: http://dx.doi.org/10.1088/1742-5468/2008/10/P10008.

    Boobier. Tony. 2020. AI and the Future of Banking. New Jersey: John Wiley & Sons Ltd.

    Branscomb, Lewis. 2004. “Protecting civil society from terrorism: the search for a sustainable strategy.” Technology in Society 26: 271–285.

    Byrne DJ, Morgan, David, Tan, Kymie, Johnson, Bryan, and Chris Dorros. 2014. “Cyber Defense of Space-Based Assets: Verifying and Validating Defensive Designs and Implementations.” Procedia Computer Science 28: 522 – 530.

    Canaan, Bushra, Colicchio, Bruno, and Dj. Ould Abdeslam. 2020. “Microgrid Cyber-Security: Review and Challenges toward Resilience.” Sustainability 2020: 5649.

    Choo, R., Kim-Kwang, 2011. “The cyber threat landscape: Challenges and future research directions.” Computers & Security 30 (8): 719‒731.

    Croitoru, Arie, Wayant, N.; Crooks, A.; Radzikowski J.; Stefanidis, A. 2015. “Linking cyber and physical spaces through community detection and clustering in social media feeds.” Computers, Environment and Urban Systems 53: 47–64.

    Europ Assistance. 2019. “Nearly Half of consumers concerned about cyber risks.” 13.2.2019. https://webcache.googleusercontent.com/search?q=cache:H9xV_7j85VoJ:https://www.europ-assistance.com/wp-content/uploads/2021/02/1549968385135.pdf&cd=1&hl=sr&ct=clnk&gl=rs.

    Fooladivanda, Dariush, Hu, Qie, Chang, H. Young, and W. Peter Sauer. 2019. “Secure State Estimation and Control for Cyber Security of AC Microgirds.” arXiv 2019, arXiv:1908.05843. https://arxiv.org/abs/1908.05843

    Fortunato, S.; Castellano, C. 2007. “Community Structure in Graphs.” In Chapter of Springer’s Encyclopedia of Complexity and System Science, ed. Robert Meyers, 1141‒1163. New York, NY: Springer. https://doi.org/10.1007/978-0-387-30440-3_76.

    Henson, Billy, Reyns, W. Bratfors, and S. Bonnie Fisher. 2016. “Cybercrime Victimization.” In The Wiley Handbook on the Psychology of Violence, eds. Carlos A. Cuevas, Callie Marie Rennison, 554‒570. Hoboken, New Jersey: John Wiley & Sons Ltd.

    Hinduja, Sameer, and Justin Patchin W. 2010. “Bullying, cyberbullying, and suicide.” Archives of Suicide Research 14: 206–221.

    Holt, J. Thomas. 2016. “Cybercrime.” In The Handbook of Measurement Issues in Criminology and Criminal Justice, eds. Beth M. Huebner, Timothy S. Bynum, 29‒48. New Jersey: John Wiley & Sons Ltd.

    Jansson, Kenny Olof Robert,  and Solms von Rossouw 2010. “Social Engineering: Towards A Holistic Solution.” In Human Aspects of Information Security Assurance. Proceedings of the South African Information Security Multi-Conference (SAISMC), eds. Nathan Clarke, Steven Furnell, Rossouw von Solms, 23‒34. South Africa: Port Elizabeth.

    Jiao, Qiang, Modares, Hamidreza, Lewis, L. Frank, Xu, Shengyuan, and Lihua Xie. 2016. “Distributed α2-gain output-feedback control of homogeneous and heterogeneous systems.” Automatica 71: 361–368.

    Luknar, Ivana. 2020. “Cybercrime – Emerging Issue.” In Archibald Reiss Days, ur. Stevo Jaćimovski, 621‒ 628. Beograd: Kriminalističko-policijski univerzitet.

    Luknar, Ivana. 2022. “Social control theory and cybercrime.” Nacionalni interes 41(1): 147‒159. doi: https:doi.org//10.22182/ni.4112022.7.

    Mamdouh Khalil, S., Bahsi, H., Ochieng’ Dola, H., Korõtko, T., McLaughlin, K., and Kotka, V. 2023. “Threat Modeling of Cyber-Physical Systems – A Case Study of a Microgrid System.” Computers & Security 124: 102950.

    Mitchell, J. Kimberly, Finkelhor David, and A. Kathyn Becker-Blease. 2007. “Linking youth internet and conventional problems: Findings from a clinical perspective.” Journal of Aggression, Maltreatment and Trauma. 15: 39–58.

    Mitnick D. Kevin, Simon L. William, and Steve Wozniak. 2002. The art of deception: controlling the human element of security. Hoboken, New Jersey: Wiley & Sons.

    Mo, Yilin, Chabukswar, Rohan, and Bruno Sinopoli. 2014. “Detecting integrity attacks on SCADA systems.” IEEE Transactions on Control Systems Technology 22 (4): 1396–1407.

    Priyadarshini, Ishaani, Kumar, Raghvendra, Sharma, Rohit, Kumar Singh, Pradeep, and C. Suresh Satapathy. 2021. “Identifying cyber insecurities in trustworthy space and energy sector for smart grids.” Computers and Electrical Engineering 93: 107‒204.

    Rago, M., and Chet Hosmer. 2013. Data hiding. Amsterdam, The Netherlands: Elsevier/Syngress.

    Reich, Walter. 1990. “Understanding terrorist behaviour: the limits and opportunities of psychological inquiry.” In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich, 261‒280. New York: Cambridge University Press.

    Renda, Andrea. 2019. Artificial Intelligence. Ethics, governance and policy challenges. Brussels: Centre for European Policy Studies (CEPS).

    Rogers, Marc. 2003. “The Psychology of Cyber-terrorism.” In Terrorists, Victims, and Society: Psychological Perspectives on Terrorism and Its Consequences; ed. Andrew Silke, 77‒92. Chichester: Wiley.

    Siponen, T. Mikko 2000. “A conceptual foundation for organizational IS security awareness.” Information Management & Computer Security 8: 31–4.

    Sunde, Marie Inger. 2018. “Cybercrime Law.” In Digital Forensics, ed. Andre, Arnes, 51‒116. Hoboken, New Jersey: John Wiley & Sons Ltd.

    Symantec. 2010. “Norton cybercrime report: The human impact Reveals Global Cybercrime Epidemic and Our Hidden Hypocrisy.” 8 September 2010. https://community.norton.com/en/blogs/symantec-cyber-education/norton%E2%80%99s-cybercrime-report-human-impact-reveals-global-cybercrime.

    Yannakogeorgos, A. Panayotis. “The Newest Security Threat: Cyber-Conflict”. In Local Planning for Terror and Disaster: From Bioterrorism to Earthquakes; Cole, A. L., Connell, D. N., Ed.; Wiley‐Blackwell 2012, pp. 227‒238.

    Yue, On-Ching. 2003. “Cyber security.” Technology in Society 25: 565–569.

    Zhuge, Hai. 2011. “Semantic linking through spaces for cyber-physical-socio intelligence: A methodology.” Artificial Intelligence 175: 988–1019.

    Luknar, Ivana. 2022. Sajber terorizam: mere za suzbijanje i prevencija, Beograd: Institut za političke studije.

СРПСКА ПОЛИТИЧКА МИСАО 1/2024 1/2024 UDC 327.88::323.28 343.3::004 161-177