- citati u SCIndeksu: [2]
- citati u CrossRef-u:[2]
- citati u Google Scholaru:[
]
- posete u poslednjih 30 dana:20
- preuzimanja u poslednjih 30 dana:12
|
|
2016, vol. 58, br. 3, str. 113-128
|
Internet stvari, lična i materijalna bezbednost
Internet of things (IoT), personal and material security
Sažetak
Pojava kiber napada nastalih upotrebom računarskih tehnologija u nezakonite svrhe obuhvata mnoge načine i oblike zlonamernog delovanja: širenje štetnih virusa, izazivanje kvarova mrežnog sistema, uništavanje podataka, prikupljanje i klasifikaciju privatnih informacija, širenje dezinformacija, remećenje procesa upravljanja, nadzora, kontrole prenosa podataka, navigacije, logističke podrške ili informacionih operacija. Svi ovi napadi, sa funkcionalnog aspekta, imaju zajednički modus operandi u vidu upada u sistem radi neovlašćenog pristupa. Stoga se u ovom radu polazi od pretpostavke da uvećavanje broja senzora i korisnika koji su sastavni deo razvoja interneta stvari podrazumeva i proporcionalni porast broja tačaka za eventualne upade u informacione sisteme. Pošto su sistemi za zaštitu računara digitalni, a samim tim i izloženi riziku od napada, računarska bezbednost postaje izazov za bezbednost informacionog prostora. Uređenje interneta na nacionalnom nivou, sa ciljem zaštite korisnika, jedan je od faktora borbe protiv kriminala, a shodno tome i element poboljšanja kvaliteta života društvene zajednice. Problem zaštite informacionog prostora proističe iz činjenice da se obim nacionalnih zakona završava na granicama države, i da država nema isključivu kontrolu nad internetom. Uprkos tome, način na koji će se uspostavljati poverenje između građana i države u praksi zavisiće od pravne sigurnosti građana u nacionalnom kiber prostoru. U tu svrhu, države, kao jedan od najvećih potrošača informacionih dobara i investitora u razvoj informacione infrastrukture, mogu da ukažu na određene slabosti interneta i njegovih karakteristika i na taj način izvrše promociju poverenja i transparentnosti, umesto neizvesnosti u primeni novih tehnologija.
Abstract
Cyber attack, as the use of computer technologies for illegal purposes, encompasses many modalities: spreading harmful viruses, causing network system failures, destruction of data, gathering classified or private information, spreading disinformation, disrupting processes of management, surveillance, control, transfer of data, navigation, logistic support or operations. All of them, from the functional aspect, have a common modus operandi in form of intrusion into a system for the purpose of unauthorized access and/or stealing data. This article starts from the presumption that multiplication of censors and users, which is integral to development of the Internet of things, includes the proportional rise in number of points for possible intrusion into systems. Since the computer protection systems are digital, and thus also exposed to the risk of attack, computer security presents a challenge for achieving an internal dimension of security. Arranging the Internet on a national level, with a goal to protect the users, is a factor of the fight against crime, and consequently of improving the quality of life. The principle problem arises from the fact that the range of national law ends with borders, and no state has exclusive control over the Internet. Despite that, the way that will establish the confidence of citizens in practice depends on the legal arrangement of national cyberspace. For this purpose, a state, as one of the largest consumers and investors, can point out to certain characteristics and in this way aid promotion of trust and transparency, instead of uncertainty, in the implementation of new technologies.
|
|
|
Reference
|
|
*** (2014) Your fridge is full of SPAM: Proof of an IoT-driven attack. Proofpoint, 16.1.2014, https://www.proofpoint.com/us/threat-insight/post/Your-Fridge-is-Full-of-SPAM#sthash.2gVU5VLA.dpuf, 19.4.2016
|
|
Bibri, S.E. (2015) The shaping of ambient intelligence and the internet of things: Historico-epistemic, socio-cultural, politico-institutional and eco-environmental dimensions. Amsterdam: Atlantis, p. 31
|
1
|
Bodrožić, I. (2013) Krivična dela sa elementima visokotehnološkog kriminala. Bezbednost, Beograd, vol. 55, br. 2, str. 142-157
|
|
Citrigno, S., Graziano, S., Sacca, D. (2016) Cooperation of Smart Objects and Urban Operators for Smart Coty Applications. u: Guerrieri A. [ur.] Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and Applications, Cham: Springer, p. 172
|
|
Conheady, S. (2014) Social engineering in IT security: Tools, tactics, and techniques: Testing tools, tactics & techniques. New York: McGraw Hill Education, p. 94
|
|
Cristea, V., Dobre, C., Pop, F. (2013) Context-Aware Environments for the Internet of Things. u: Bessis, Nik [ur.] Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence, Berlin - Heidelberg: Springer, str. 25-49
|
|
Dhanjani, N. (2016) Abusing the Internet of Things: Blackouts, Freakouts and Stakeouts. u: Internet of Things, Sebastopol: O’Reilly Media, str. 201-218
|
|
FBI (2016) Public Service Announcment: Internet of Things Poses Opportunities for Cyber Crime. http://www.ic3.gov/media/2015/150910.aspx, dostupno 22. 4. 2016
|
1
|
Greengard, S. (2015) The internet of things. Cambridge - London: MIT Press, pp. 74, 159-160
|
|
Hayashi, K. (2013) Linux worm targeting hidden devices. Symantec, 21.4.2015, http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices
|
|
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K. (2011) Security Challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3): 527-542
|
2
|
Mijalković, S., Popović, M. (2015) Uvod u studije bezbednosti. Beograd: Kriminalističko-policijska akademija, str. 215-222
|
14
|
Mijalković, S. (2011) Obaveštajno-bezbednosne službe i nacionalna bezbednost. Bezbednost, Beograd, vol. 53, br. 1, str. 74-92
|
4
|
Milanović, Z., Radovanović, R. (2015) Informaciono-bezbednosna kultura - imperativ savremenog društva. Nauka, bezbednost, policija, vol. 20, br. 3, str. 45-65
|
|
Ning, H. (2013) Unit and Ubiquitous Internet of Things. Boca Raton: CRC Press
|
5
|
Petrović, S.R. (2006) O neophodnosti nacionalne strategije zaštite kiber-prostora. Nauka, bezbednost, policija, vol. 11, br. 2, str. 3-28
|
|
Qi, Z., Fitzek, F. (2015) Mission Critical IoT Communication in 5G. u: Future Access Enablers for Ubiquitous and Intelligent Infrastructures: First International Conference, FABULOUS 2015, Revised Selected Papers, Cham, Springer, p. 36
|
|
RFID Working Group of the European Technology Platform on Smart Systems Integration (2008) Internet of things in 2020: Roadmao for the future. Brussels: European Commission, p. 6
|
|
Stackowiak, R., Licht, A., Mantha, V., Nagode, L. (2015) Big Data and The Internet of Things: Enterprise Information Architecture for A New Age. New York: Apress, str. 115-138
|
|
Stojanović, M.P., Petrović, S.R., Stepanović, R. (2010) Značaj informacione tehnologije u bankarstvu na suzbijanju krivičnog dela prevare kao savremenog vida kriminala pod okriljem 'legalnog' poslovanja. Bezbednost, Beograd, vol. 52, br. 2, str. 81-96
|
|
The Central Intelligence Agency (2015) An encyclopedia of covert ops. u: Goldman Jan [ur.] Intelligence Gathering, and Spies: An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies, Santa Barbara: ABC-CLIO, p. 819
|
|
Tommasetti, A., Vesci, M., Troisi, O. (2015) The Internet of Things and Value Co-creation in a Service-Dominant Logic Perspective. u: Francesco Colace [ur.] Data Management in Pervasive Systems, Springer, p. 6
|
|
Vermesan, O., Friess, P. (2015) Introduction. u: Vermesan O., Friess P. [ur.] Building the Hyperconnected Society: Internet of Things Research and Innovation Value Chains, Ecosystems and Markets, Aalborg: River Publishers
|
5
|
Žarković, I. (2015) Mere elektronskog nadzora zaposlenih i pravo na privatnost na radnom mestu. Nauka, bezbednost, policija, vol. 20, br. 3, str. 165-182
|
|
|
|