Modern society is critically dependent on information as a strategic resource and information and communications technology, which carries out its transmission, processing and exchange. Information and communications technology has created a new environment, cyberspace, in which tensions, disagreements and incidents are becoming more frequent. In recent years, the mentioned area has increasingly appeared as a domain of conflict between the leading world and regional powers. The paper gives a brief description of the concept of operations in several domains and elements of the new concept of joint warfare of the US Armed Forces. The importance of cyberspace for the US has been pointed out with a review of organizational changes and the adoption of certain strategic and doctrinal documents. The paper presents certain events and activities in cyberspace, in recent years, between the United States on the one hand, and Iran and North Korea on the other. The United States Cyber Command (USCYBERCOM) was created in 2009. USCYBERCOM was elevated to the status of a full and independent unified command in May 2018. It indicates the importance of cyberspace for the Pentagon. In many ways, the separation of USCYBERCOM from Strategic Commands, which oversees strategic rejection, is a symbol of the change in the US attitude in cyberspace from "defensive" to "persistent engagement." The United States is still the strongest force in cyberspace and shows ambition to carry out cyber operations at all levels of command. It is unlikely that Iran will provoke the United States into a large-scale military conflict and wage a direct war in cyberspace. Iran has rapidly improved its ability to operate in cyberspace, and it is estimated that this trend will continue. The imbalance can prevent Iran from a direct military conflict with the United States and its allies. Greater action is expected with an asymmetric arsenal such as e.g. cyber attacks. Iranian and North Korean operations are similar in target selection, planning and exploitation of attacks. Both countries undertake different variants of phishing attacks in an attempt to deceive their victims into downloading malicious software by presenting it as a legitimate link or file. Whereas Iran usually had a motive only to cause disruption to the functioning of financial institutions, North Korean motive was both financial and political retaliation. Certain discovered incidents indicate that North Korea devotes much more time to conducting invasive surveillance before carrying out attacks. Numerous examples show that some activities have been prepared over the years and with the support of certain state bodies. Regardless of the fact that an investigation has been launched against certain groups, most often sponsored by states, it is unlikely that this will deter countries such as North Korea and Iran from giving up further activities and will pose an increasing threat to the US security.
radu se razmatraju osnovni pojavni oblici kompjuterskog kriminala sa težištem na krađi identiteta kao posebnom obliku pri kojem se vrši nelegalno pribavljanje poverljivih ličnih podataka radi izvršenja novih krivičnih dela. Prikazani su osnovni metodi i tehnike krađe podataka o ličnosti od krajnjih korisnika interneta, sa ličnih računara i iz velikih baza podataka i upotreba ukradenih podataka za izvršenje krivičnih dela. Na osnovu dostupnih podataka prikazane su tendencije porasta broja i oblika visokotehnološkog kriminala i krađe identiteta kod nas i u svetu. Sagledan je mogući razvoj novih i usavršavanje postojećih metoda i tehnika za krađu identiteta i posledice njihovog korišćenja za izvršenje krivičnih dela.
Armed conflicts disrupt political, legal and social peace and create an environment conducive to human trafficking, as another dimension of violence and brutality. The direct connection between these two phenomena arises from the hostility of the parties in the conflict and encompasses the areas affected by the conflict, and the indirect connection is manifested in the area outside the conflict, in refugee camps or on migration routes. The most significant influencing factors on human trafficking, in addition to those operating in peace (push and pull factors), are the weakening of state institutions and the collapse of the rule of law, population displacement, poverty, population fragmentation and family collapse. The increased scope of migration (internal and cross-border) has a significant impact on human trafficking. Unsafe living conditions and various forms of violence complicate push and pull factors, which initiate mass migrations.People on migrant routes are very vulnerable and exposed to organized criminal groups and terrorist groups, with the risk of becoming victims of human trafficking or other forms of violence. The characteristic types of exploitation in armed conflict are sexual exploitation, sexual slavery, forced labor, organ removal, and recruitment to engage in conflict, often involving children. The main actors in human trafficking are armed and criminal groups. By trafficking, armed groups carry out a profit for their own financing, strengthen military capabilities and create fear among the population to control the territory. Sexual and other violence is also used as part of broader strategies to expel undesirable groups and exploit disputed land and other resources. Trafficking in children is mainly a consequence of the economic difficulties experienced by their families. Children are usually exploited in areas of work that do not require special expertise, such as agricultural work, street sales, etc., but are also used in armed conflicts as suicide bombers or human shields. The use of children as armed fighters is widely documented in sub-Saharan and central Africa, the Middle East, and other regions of Asia. In addition to various types of violence and general suffering of the population, human trafficking in armed conflicts has a particularly negative impact on human rights violations, when the exploitation of victims can be transformed into more serious crimes. Suitable conditions for human trafficking persist after the conclusion of a formal truce or peace. The lack of the legal system's and institution's functioning results in impunity for perpetrators of criminal acts and the growth of organized crime, and thus human trafficking. The persistently high degree of disintegration, which has affected human trafficking in armed conflicts, as well as the new difficult economic circumstances, further increase the risk of human trafficking. Particularly tempting targets for traffickers are displaced persons and refugees returning from camps or war camps. Human trafficking in the post-conflict period, although mostly indirectly, is also affected by the presence of various peace and other missions, especially on trafficking for sexual and labor exploitation.
The mass application of information and communication technologies (ICT) has facilitated the functioning of organizations, but has also increased their vulnerability and conditioned the development of the information security function. Attacks on ICT systems involve people as potential targets of vulnerability, highlighting the importance of paying close attention to an employee's behavior in interactions with elements of the ICT system and its environment, as well as developing an information security culture (ISC) as an integrative component of organizational culture and an important factor in the organization's information security. The paper attempts to set a comprehensive concept of ISC based on the unity of knowledge, perceptions, beliefs and attitudes of employees and their coordinated actions in the application of security measures, which emphasize the role of the organization and its management in creating, building and maintaining ISC. The focus of determining ISC is on understanding and applying information security policy measures, but it also includes the behavior of employees in situations that are not or could not be predicted, when employees are expected to protect the information assets of the organization. The paper identifies the most important external factors that are mostly objective, determined by the situation in the country in which the organization operates and contained in the elements of general social (national) culture and country's economic and technological development. As a specific impact on ISC, the activities of malicious individuals, groups and organizations in cyberspace - stand out, manifested through threats and endangerment to the integrity of the ICT system. Internal factors are mostly subjective and dependent on general organization; the knowledge, vision and actions of management in the field of information security; individual characteristics of people, their values, needs, knowledge, understanding and application of information security policy measures. Among the factors, the highest level of management stands out for its role and importance due to the greatest responsibility for organization's information security, but also as the creator of its strategy and policy, the holder of resource engagement policy, shaper of professional security teams, decisionmaker on hardware and software protection, and supporter, creator and implementer of programs for ISC level raising.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.