Metrika članka

  • citati u SCindeksu: [2]
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[=>]
  • posete u poslednjih 30 dana:13
  • preuzimanja u poslednjih 30 dana:11
članak: 3 od 5  
Back povratak na rezultate
Vojnotehnički glasnik
2012, vol. 60, br. 2, str. 84-117
jezik rada: srpski
vrsta rada: izvorni naučni članak
objavljeno: 24/07/2012
doi: 10.5937/vojtehg1202084M
Definisanje sajber ratovanja
aVojska Srbije, Garda, Beograd
bVojska Srbije, Generalštab, Uprava za logistiku (J-4), Beograd
cUniverzitet u Beogradu, Fakultet organizacionih nauka

e-adresa: dragan.mladenovic@vs.rs

Sažetak

Sajber sukobi predstavljaju novu vrstu ratovanja koja se tehnološki veoma brzo razvija. Rezultat tog razvoja su sve češći i intenzivniji sajber napadi koje države pokreću na protivničke ciljeve i koji imaju širok spektar dejstva, od informacionih do fizičkog uništenja ciljeva. Međutim, sajber ratovanje se vodi primenom istih sredstava, tehnika i metoda kao i u slučaju sajber kriminala, terorizma i obaveštajnih aktivnosti i ima veoma specifičnu prirodu, koja omogućava državama da prikriveno pokreću napade na protivnika. Polazna tačka pri definisanju doktrina, procedura i standarda u oblasti sajber ratovanja je utvrđivanje njegove prave prirode. U ovom radu dat je doprinos tom nastojanju primenom analize postojećih državnih doktrina i međunarodne prakse u oblasti sajber ratovanja i utvrđivanju njegove nacionalno prihvatljive definicije.

Ključne reči

Reference

*** (2011) H.R.1389: Global online freedom act of 2011. u: 112th Congress, 1389 I.H., The library of congress, Thomas, 6 april 2011; http://thomas.loc.gov/cgi-bin/query/z?c112:H.R.1389, Citirano: 12. April, H.R. 1389
*** (2008) Developments in the field in the information nd telecommunications in the context of international security. United Nations General Assembly, 6 November, http://daccess-dds- ny.un.org/doc/UNDOC/GEN/N08/520/01/PDF/N0852001.pdf?OpenElement, [citirano: 8. mart 2011]
Clarke, R. (2010) Cyber War: The next treat to National Security and What to do about it. New York: Ecco, Harper Collins, ISBN 0061962236
Clinton, H., U.S. Department of State (2010) Remarks on internet freedom. http://www.state.gov/secretary/rm/2010/01/135519.htm, 21 January, citirano: 2. Februar 2011
Faillere, N.O., Murchy, L., Chien, E. (2011) W32 Stuxnet Dossier. symantec.com, February, http://www.symantec.com/content/en/us/enterprise/media/security_responsewhitepapers/w32_stuxnet_dossier.pdf, citirano: 28. mart 2011
General Assembly (1999) Developments in the field of information and telecommunications in the context of international security: UN document A/RES/53/70. 4 January; http://daccess-ddsny.un.org/doc/UNDOC/GEN/N99/760/03/PDF/N9976003.pdf?OpenElement, citirano: 16. mart 2011
General Assembly (2001) Developments in the field of information and telecommunications in the context of international security: Report of the secretary-general. A/56/164/Add. 1, 3 October, http://www.un.org/documents/ga/docs/56/a56164a1.pdf, citirano: 19. Mart 2011, Addendum
Kamal, A. The law of cyber-space. Geneva: United Nations institute for training and research, ISBN 9291820388, 2005; http://www.un.int/kamal/thelawofcyberspace/fulltext.htm, citirano: 12. april 2010
Kellz, S., Cook, S. (2011) Freedom on the net 2011: A global assessment of internet and digital media. freedomhouse.org, 18 April, http://www.freedomhouse.org/images/File/FotN/FOTN2011.pdf, citirano: 20. april 2011
Komov, S., Korotkov, S., Dylevski, I. (2007) Military aspects of ensuring international information security in the context of elaborating universally acknowledged principles of international law, ICTs and International Security. www.unidir.org/pdf/articles/pdf-art2645.pdf
Korotkov, S., Ministry of defence Russian Federation (2008) Legal aspects of informational operations. 24-25 April; www.unidir.org, http://www.unidir.org/audio/2008/Information_Security/en.htm, citirano: 1. mart. 2011
Libicki, M. (2009) Cyber deterrence and cyber war. Arlington: Rand Publishing
Mladenović, D.D., Jovanović, D.M., Drakulić, M.S. (2012) Tehnološki, vojni i društveni preduslovi primene sajber ratovanja. Vojnotehnički glasnik, vol. 60, br. 1, str. 70-98
Nye, J.S. (2004) Soft power: The means to success in world politics. New York: Public Affairs
Pejanović, M.J. (2011) Razvoj informacionih sistema u Internet okruženju korišćenjem softverskih komponenti sa posebnim osvrtom na primenu u vojnoj organizaciji. Vojnotehnički glasnik, vol. 59, br. 1, str. 121-148
Prezident Rossii (2010) Voennaja doktrina Rossijskoj Federacii. www.kremlin.ru, http://news.kremlin.ru/ref_notes/461, 5 fevralja, citirano: 4 mart 2011
Randall, K. (1988) Universal Jurisdiction Under International Law and Foreign Affairs. Texas Law Review, 66, 4, 785-841
Rauscher, K., Korotkov, A. (2011) Working towards rules for governing cyber conflict: Russia-U.S. bilateral on critical infrastructure protection. East-West institute, January; http://www.ewi.info/working-towards-rules-governing-cyber-conflict, citirano: 28. Januar 2011
Rauscher, K. (2004) Protecting communications infrastructure. u: Bell Labs Technical Journal-Special Issue: Homeland Security, Wiley Inter Science, Issue 2, Summer, T. Volume 9, str. 1-4
Rausher, K., Yaschenko, V. (2011) Russia - U.S. bilateral on cybersecurity: Critical terminology foundations. East West Institute, 26. Apr. 2011, 28. apr. 2011 www.ewi.info/russia-us-bilateral-cybersecurity-critical-terminology-foundations
Rho, J. (2007) Blackbeards of the twenty-first century: Holding cybercriminals liable under the Alien tort statue, Chicago, Chicago. Journal of International Law, vol. 7, Number 2, Winter 2007 (8 Chi J Intl L 695), str. 695-718
Sommer, P., Brown, I., OECD (2011) Reducing systems cybersecurity risk. 14 January, http://www.oecd.org/dataoecd/3/42/46894657.pdf, citirano: 12. mart 2011
Sovet bezopasnosti Rossijskoj Federacii (2000) Doktrina informacionnoj bezopasnosti Rossijskoj Federacii № Pr-1895. www.scrf.gov.ru, 9 sentjabrja, http://www.scrf.gov.ru/documents/5.html, citirano: 1 jun 2011
The White House (2011) International strategy for cyberspace. May, http://www.whitehouse.gov/sites/default/files/rss_viewer/internationalstrategy_cyberspace.pdf, citirano: 20 maj 2011
US Department of defense (2011) Strategy for operating in cyberspace. July, http://www.defense.gov/news/d20110714cyber.pdf, citirano: 14. jul
US Department of defense (2010) Dictionary of military and associated terms. www.dtic.mil, 8 November, www.dtic.mil/doctrine/dod_dictionary, citirano: 15. maj 2011
Wilson, C. (2007) Infromation operations, electronic warfare, and cyberwar: Capabilities and related policy issues. www.fas.org, 20 March, Order code RL31787 http://www.fas.org/sgp/crs/natsec/RL31787.pdf, citirano: 13 jun 2009, CRS report for Congress