Metrika članka

  • citati u SCindeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[=>]
  • posete u poslednjih 30 dana:3
  • preuzimanja u poslednjih 30 dana:2
članak: 9 od 55  
Back povratak na rezultate
Tehnika
2019, vol. 74, br. 4, str. 603-607
jezik rada: engleski
vrsta rada: stručni članak
objavljeno: 30/08/2019
doi: 10.5937/tehnika1904603D
Creative Commons License 4.0
Standardizacija visokotehnološke bezbednosti Interneta stvari
Subotica

e-adresa: milicadjekic82@gmail.com

Sažetak

Obzorje Interneta Stvari (IS) je brzo narastajuće tržište sa jako mnogo otvorenih pitanja koja pristižu. Glavni izazov za ovo polje je još uvek njegova bezbednost i mnogo sadašnjih i dolazećih profesionalaca treba da se izbori sa tim problemima. Kao što se zna, IS rešenja se oslanjaju na digitalne, umeštene i mehatroničke sisteme koji su otvoreni prema Web-u. Jako mnogo stručnjaka u toj oblasti sugeriše da treba obratiti pažnju na visokotehnološku bezbednost na samom početku projekta, što znači mnogo napornog rada za istraživačko-razvojne timove. Ovim se dovode u vezu tehničke nauke, bezbednost i standardizacija kao neizostavni učesnici u razvoju projekta. Najpoznatiji međunarodni standardi dolaze iz Švajcarske i dobro su poznati kao ISO standardna rešenja. Glavno pitanje je koliko možemo da verujemo novim tehnologijama i to je nešto što danas ulazi u zakonske okvire. Dakako, međunarodna standardizacija visokotehnološke bezbednosti IS-a je nešto što mora da prođe kroz panel diskusije i zvanične sastanke. U ovom radu, pokušaćemo da damo sveobuhvatan uvid u to kako međunarodna standardizacija funkcioniše u praksi i zašto je bitno standardizovati savremene tendencije.

Ključne reči

Reference

*** (2004) CRS report for Congress: Critical infrastructure and key assets: Definition and identification. https://www.fas.org/sgp/crs/RL32631.pdf
Ablon, L., Libicki, M.C., Golay, A. (2014) Markets for cybercrime tools and stolen data. Sponsored by Juniper Networks, Dostupno na http://www.rand.org/content/dam/rand/pubs/research_reports/RR600/ RR610/RAND_RR610.pdf
Beaver, K., Davis, P. (2005) Hacking Wireless Networks for Dummies. Wiley Publishing, https://cdn.preterhuman.net/texts/underground/hacki ng/Hacking_Wireless_Networks_For_Dummies_20 05.pdf
Bergman, M. (2000) The Deep Web: Surfacing Hidden Value. White paper, Dostupno na http://jornalggn.com.br/sites/default/files/documentos/2011_ bergman_7_cafarella_informationretrieval_presentat ion1_2.pdf
Chaliand, G., Blin, A. (2007) The History of Terrorism. University of California Press, https://wikileaks.org/gifiles/attach/177/177597_History%20of%20Ter.pdf
Charney, S. (2009) Rethinking the Cyber Threat: A Framwork and Path Forward. Microsoft
Government of the Hong Kong Special Administrative Region (2008) RFID security. http://www.infosec.gov.hk/english/technical/files/rfid.pdf
James, P., Jenson, M., Tinsley, H. (2015) Understanding the threat: What data tell us about U.S. foreign fighters. START, Dostupno na https://www.start.umd.edu/publication/understanding-threatwhat-data-tell-us-about-us-foreign-fighters
Mester, G., Rodic, A. (2010) Sensor-Based Intelligent Mobile Robot Navigation in Unknown Environments. International Journal of Electrical and Computer Engineering Systems, 1(2): 1847-6996
Mester, G., Pletl, S., Pajor, G., Jeges, Z. (1992) Flexible Planetary Gear Drives in Robotics. u: The 1992 International Conference on Industrial Electronics, Control, Instrumentation and Automation: Robotics, CIM and Automation, Emerging Technologies, IEEE IECON '92, San Diego, California, USA, N, Vol. 2, pp. 646-649, ISBN 0-7803-0582-5
Payne, S.P. (2007) A guide to security metrics. SANS Institute, Web source: https://www.sans.org/readingroom/whitepapers/auditing/guide-security-metrics-55
Ponemon Institute LLC (2015) 2015 cost of data breach study: Global analysis. Ponemon Institute Research Report, Dostupno na https://nhlearningsolutions. com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF
Puhe, M., Edelmann, M., Reichenbach, M. (2014) Integrated urban e-ticketing for public transport and touristic sites. u: Final report: Science and Technology Options Assessment, Web source: http://www.europarl.europa.eu/RegData/etudes/etudes/join/2014/513551/ IPOL-JOIN_ET(2014)513551_EN.pdf
Rodić, A., Mester, G., Stojković, I. (2013) Qualitative Evaluation of Flight Controller Performances for Autonomous Quadrotors. u: Endre Pap [ur.] Intelligent Systems: Models and Applications (Topics in Intelligent Engineering and Informatics), Berlin-Heidelberg: Springer-Verlag, 3: 115-134, Vol. 3, Part. 2, TIEI 3, ISSN 2193-9411, ISBN 978-3-642-33958-5
Symantec (2016) Internet security threat report. https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf
Weine, S., Ellis, B. H. (2015) Lessons learned from mental health and education: Identifying best practices for addressing violent extremism. START, https://www.start.umd.edu/pubs/START_LessonsLearnedfromMentalHealthAndEducation_FullReport_Oct2015.pdf
Weine, S., Ellis, B. (2015) Supporting a multidisciplinary approach to addressing violent extremism. START, https://www.start.umd.edu/pubs/START_LessonsLearnedfromMentalHealthAndEducation_MentalHealthSummary_Oct2015.pdf