- citati u SCIndeksu: [2]
- citati u CrossRef-u:0
- citati u Google Scholaru:[]
- posete u poslednjih 30 dana:28
- preuzimanja u poslednjih 30 dana:15
|
|
2015, vol. 67, br. 3, str. 135-154
|
Evropska strategija bezbednosti i sajber pretnje - značaj za Srbiju
European security strategy and cyber threats: Importance for Serbia
aMinistarstvo unutrašnjih poslova Republike Srbije bnema
Sažetak
Sajber pretnje predstavljaju jednu od najvećih pretnji u modernim sukobima, jer relativno male snage i tzv. nepoznati napadači mogu naneti ogroman gubitak moćnijima, posebno u domenu upotrebe informacione tehnologije. Stoga, sve zemlje sveta poklanjaju izuzetnu pažnju zaštiti (odbrani) od sajber napada (pretnji). Evropska unija prednjači u nastojanju da se odbrana od sajber pretnji reguliše u normativno-pravnoj i strategijsko-doktrinarnoj sferi. Za tu svrhu posebno je značajna Strategija EU, koja ima značaj i za Republiku Srbiju.
Abstract
Cyber threats are among the greatest threats in modern conflicts, because relatively small forces and so-called unknown attackers may inflict huge losses to the more powerful, especially in the field of the information technology use. Therefore, all countries in the world pay great attention to the protection/defense against cyber attacks/threats. The European Union leads the efforts to regulate the defense against cyber threats in the legal regulatory and strategic-doctrinal domain. For this purpose, particularly important is the EU Strategy, which is significant for the Republic of Serbia as well.
|
|
|
Reference
|
|
*** (2006) A strategy for a secure information society. Brussels: Commission of The European Communities, COM(2006) 251, http://ec.europa.eu/information_society/doc/com2006251.pdf
|
|
*** (2010-2013) Službeni glasnik RS, br. 44/2010, 60/2013
|
|
*** (2009) Službeni glasnik RS, br. 104
|
|
*** (2005) Nacionalni program informacijske sigurnosti u Republici Hrvatskoj. Hrvatska: CERT
|
|
*** (2014) Nacrt zakona o informacionoj bezbednosti Srbije, poslednja verzija iz januara 2014
|
|
*** (2011) Convention on cybercrime. Budapest: Council of Europe, http://conventions.coe.int/Treaty/en/Treaties/Word/185.doc
|
|
*** (2011) Cyber security strategy of Czech Republic (2011-2015). European Union Agency for Network and Information Security, https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/cyber-security-strategy-of-czech-republic-2011-2015/at_download/file
|
|
*** (2013) Cybersecurity strategy of the European Union: An open, safe and secure cyberspace. Brussels: European Commission, JOIN, http://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf
|
|
*** (2011) International strategy for cyberspace. Washington: U.S. White House, http://www.whitehouse.gov/sites/default/files/rss_viewer/internationalstrategy_cyberspace.pdf
|
|
*** Special Eurobarometer 404: Cyber security report
|
|
Bernays, L.E. (1928) Manipulating Public Opinion: The Why and The How. American Journal of Sociology, 33(6): 958
|
|
Brunner, M., Suter, E.M. (2008) International CIIP handbook 2008/2009. Center for Security Studies, ETH Zurich
|
|
Italian Information and Security Department (2011) Report on information policy for security in the year 2010. Rim: Presidency of the Council of Ministers, str. 23-35
|
|
|
|