Miljković, Milan

Link to this page

Authority KeyName Variants
2354f3b3-dbf4-4e2c-ba57-3958634a1e6e
  • Miljković, Milan (2)
Projects
No records found.

Author's Bibliography

Activities of modern intelligence services in cyberspace

Miljković, Milan; Putnik, Nenad

(Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd, 2016)

TY  - JOUR
AU  - Miljković, Milan
AU  - Putnik, Nenad
PY  - 2016
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/319
AB  - Espionage between countries dates back hundreds of years. Since the Internet was released for commercial use, developed countries started to exploit the advantages of computers and the Internet in espionage. Intelligence activity seeks to exploit all advantages and disadvantages of the mass use of information and communications technology (ICT) for purposes of intelligence activities. There is no serious intelligence service in the world which is not interested in this way of intelligence research, primarily because of the cost-effectiveness of such activity in comparison to other ways of collecting classified information. Nowadays, great powers are accusing each other of cyber espionage, the core issues being when one was spying on the other and who hired whom for that purpose. Cyberspace, by its nature, denies answers to these questions; in cyberspace it is very difficult to discover the identity of any malicious actor, as well as to prove the performance and ordering of such illegal operations. That is why the activities of the intelligence services in cyberspace will be ever more present, which will likely lead to changes in the way of intelligence gathering.
AB  - Špijunaža između država je stara stotinama godina. Od puštanja interneta u komercijalnu upotrebu razvijene zemlje počinju da koriste prednosti računara i interneta u toj aktivnosti. Obaveštajna delatnost teži da iskoristi sve prednosti i mane masovne upotrebe informaciono-komunikacione tehnologije (IKT) za obavljanje obaveštajnih aktivnosti. Nema ozbiljne obaveštajne službe u svetu koja nije zainteresovana za ovaj način obaveštajnog istraživanja, pogotovo zbog ekonomičnosti ovakve aktivnosti u odnosu na druge načine prikupljanja poverljivih podataka. U aktuelnoj navali međusobnog optuživanja velikih država za kiber špijunažu nema nevinih. Suštinska pitanja su kada je neko nekoga špijunirao, i ko je koga unajmio u te svrhe. Kiber prostor se, po svojoj prirodi, protivi pronalaženju odgovora na ova pitanja - u njemu je veoma teško otkriti identitet zlonamernog aktera, kao i dokazati sprovođenje i naručivanje takvih nelegalnih operacija. Zbog toga će i aktivnosti obaveštajnih službi u kiber prostoru biti sve izraženije, što će, po svoj prilici, voditi ka promenama u načinu prikupljanja obaveštajnih podataka.
PB  - Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd
T2  - Vojno delo
T1  - Activities of modern intelligence services in cyberspace
T1  - Aktivnosti savremenih obaveštajnih službi u kiber prostoru
VL  - 68
IS  - 7
SP  - 164
EP  - 180
ER  - 
@article{
author = "Miljković, Milan and Putnik, Nenad",
year = "2016",
abstract = "Espionage between countries dates back hundreds of years. Since the Internet was released for commercial use, developed countries started to exploit the advantages of computers and the Internet in espionage. Intelligence activity seeks to exploit all advantages and disadvantages of the mass use of information and communications technology (ICT) for purposes of intelligence activities. There is no serious intelligence service in the world which is not interested in this way of intelligence research, primarily because of the cost-effectiveness of such activity in comparison to other ways of collecting classified information. Nowadays, great powers are accusing each other of cyber espionage, the core issues being when one was spying on the other and who hired whom for that purpose. Cyberspace, by its nature, denies answers to these questions; in cyberspace it is very difficult to discover the identity of any malicious actor, as well as to prove the performance and ordering of such illegal operations. That is why the activities of the intelligence services in cyberspace will be ever more present, which will likely lead to changes in the way of intelligence gathering., Špijunaža između država je stara stotinama godina. Od puštanja interneta u komercijalnu upotrebu razvijene zemlje počinju da koriste prednosti računara i interneta u toj aktivnosti. Obaveštajna delatnost teži da iskoristi sve prednosti i mane masovne upotrebe informaciono-komunikacione tehnologije (IKT) za obavljanje obaveštajnih aktivnosti. Nema ozbiljne obaveštajne službe u svetu koja nije zainteresovana za ovaj način obaveštajnog istraživanja, pogotovo zbog ekonomičnosti ovakve aktivnosti u odnosu na druge načine prikupljanja poverljivih podataka. U aktuelnoj navali međusobnog optuživanja velikih država za kiber špijunažu nema nevinih. Suštinska pitanja su kada je neko nekoga špijunirao, i ko je koga unajmio u te svrhe. Kiber prostor se, po svojoj prirodi, protivi pronalaženju odgovora na ova pitanja - u njemu je veoma teško otkriti identitet zlonamernog aktera, kao i dokazati sprovođenje i naručivanje takvih nelegalnih operacija. Zbog toga će i aktivnosti obaveštajnih službi u kiber prostoru biti sve izraženije, što će, po svoj prilici, voditi ka promenama u načinu prikupljanja obaveštajnih podataka.",
publisher = "Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd",
journal = "Vojno delo",
title = "Activities of modern intelligence services in cyberspace, Aktivnosti savremenih obaveštajnih službi u kiber prostoru",
volume = "68",
number = "7",
pages = "164-180"
}
Miljković, M.,& Putnik, N.. (2016). Activities of modern intelligence services in cyberspace. in Vojno delo
Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd., 68(7), 164-180.
Miljković M, Putnik N. Activities of modern intelligence services in cyberspace. in Vojno delo. 2016;68(7):164-180..
Miljković, Milan, Putnik, Nenad, "Activities of modern intelligence services in cyberspace" in Vojno delo, 68, no. 7 (2016):164-180.

Abuse of cyber space as means of mass communication

Putnik, Nenad; Miljković, Milan

(Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd, 2012)

TY  - JOUR
AU  - Putnik, Nenad
AU  - Miljković, Milan
PY  - 2012
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/178
AB  - Security threats to information systems may be grouped into certain types. The classification may be done according to the way of threat posing, namely techniques and instruments used for their implementation, as classification criteria. In the former research of the cyber security area, security threats in cyber space are most often identified with cyber attacks of technical type (attacks based on the use of malicious programs - malware, and attacks aimed to obstruct the services - distributed denial of service) and those attacks in cyber space which are based on the deception of other users of cyber space and the abuse of their trust (social engineering and phishing). Apart from different types of cyber attacks, which definitely represent one form of abuse of cyber space, specific abuse of this space as regards its function as a means of mass communication is also evident. In this sense, the category of cyber space security threats includes, besides the two above-mentioned aspects of cyber attacks, also 'the abuse of cyber space as a means of mass communication', as a special type of threats, in view of their destructive capability against individuals and the society as a whole. The paper presents detailed classification of security threats in cyber space, and the emphasis is put on the identification, classification and description of those phenomena that can be subsumed under a subcategory of 'the abuse of cyber space as a means of mass communication. In this sense, events of cyber space abuse for information warfare and support of terrorism are described and explained in detail.
AB  - Bezbednosne pretnje informacionim sistemima moguće je grupisati u određene vrste. Klasifikacija se može sprovesti u odnosu na način izazivanja pretnji, tj. tehnika i instrumenata koji se koriste radi njihovog ostvarivanja, kao kriterijuma klasifikacije. U dosadašnjim istraživanjima u području kiber bezbednosti, bezbednosne pretnje u kiber prostoru najčešće su poistovećivane sa kiber napadima tehničkog tipa (napadi zasnovani na upotrebi malicioznih programa − malware i napadi usmereni na opstrukciju usluga − distributed denial of service) i onim napadima u kiber prostoru koji se zasnivaju na obmanjivanju drugih korisnika kiber prostora i zloupotrebi njihovog poverenja (socijalni inženjering − social engineering i fišing − phishing). Osim različitih vrsta kiber napada koji, svakako, predstavljaju jedan vid zloupotrebe kiber prostora, evidentno je i specifično zloupotrebljavanje ovog prostora u odnosu na njegovu funkciju sredstva za masovnu komunikaciju. U tom smislu, kategoriji bezbednosnih pretnji u kiber prostoru, osim već pomenuta dva aspekta kiber napada, pripisujemo i 'zloupotrebe kiber prostora kao sredstva masovne komunikacije', kao posebnu vrstu pretnji, s obzirom na njihov destruktivni potencijal u odnosu na pojedince i društvo u celini. U radu je predstavljena detaljna klasifikacija bezbednosnih pretnji u kiber prostoru, a težište je na identifikaciji, klasifikaciji i deskripciji onih fenomena koji se mogu podvesti pod potkategoriju 'zloupotreba kiber prostora kao sredstva masovne komunikacije'. U tom smislu, detaljno su opisani i objašnjeni fenomeni zloupotrebe kiber prostora za informaciono ratovanje i za podršku terorizmu.
PB  - Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd
T2  - Vojno delo
T1  - Abuse of cyber space as means of mass communication
T1  - Zloupotreba kiber prostora kao sredstva masovne komunikacije
VL  - 64
IS  - 3
SP  - 157
EP  - 183
ER  - 
@article{
author = "Putnik, Nenad and Miljković, Milan",
year = "2012",
abstract = "Security threats to information systems may be grouped into certain types. The classification may be done according to the way of threat posing, namely techniques and instruments used for their implementation, as classification criteria. In the former research of the cyber security area, security threats in cyber space are most often identified with cyber attacks of technical type (attacks based on the use of malicious programs - malware, and attacks aimed to obstruct the services - distributed denial of service) and those attacks in cyber space which are based on the deception of other users of cyber space and the abuse of their trust (social engineering and phishing). Apart from different types of cyber attacks, which definitely represent one form of abuse of cyber space, specific abuse of this space as regards its function as a means of mass communication is also evident. In this sense, the category of cyber space security threats includes, besides the two above-mentioned aspects of cyber attacks, also 'the abuse of cyber space as a means of mass communication', as a special type of threats, in view of their destructive capability against individuals and the society as a whole. The paper presents detailed classification of security threats in cyber space, and the emphasis is put on the identification, classification and description of those phenomena that can be subsumed under a subcategory of 'the abuse of cyber space as a means of mass communication. In this sense, events of cyber space abuse for information warfare and support of terrorism are described and explained in detail., Bezbednosne pretnje informacionim sistemima moguće je grupisati u određene vrste. Klasifikacija se može sprovesti u odnosu na način izazivanja pretnji, tj. tehnika i instrumenata koji se koriste radi njihovog ostvarivanja, kao kriterijuma klasifikacije. U dosadašnjim istraživanjima u području kiber bezbednosti, bezbednosne pretnje u kiber prostoru najčešće su poistovećivane sa kiber napadima tehničkog tipa (napadi zasnovani na upotrebi malicioznih programa − malware i napadi usmereni na opstrukciju usluga − distributed denial of service) i onim napadima u kiber prostoru koji se zasnivaju na obmanjivanju drugih korisnika kiber prostora i zloupotrebi njihovog poverenja (socijalni inženjering − social engineering i fišing − phishing). Osim različitih vrsta kiber napada koji, svakako, predstavljaju jedan vid zloupotrebe kiber prostora, evidentno je i specifično zloupotrebljavanje ovog prostora u odnosu na njegovu funkciju sredstva za masovnu komunikaciju. U tom smislu, kategoriji bezbednosnih pretnji u kiber prostoru, osim već pomenuta dva aspekta kiber napada, pripisujemo i 'zloupotrebe kiber prostora kao sredstva masovne komunikacije', kao posebnu vrstu pretnji, s obzirom na njihov destruktivni potencijal u odnosu na pojedince i društvo u celini. U radu je predstavljena detaljna klasifikacija bezbednosnih pretnji u kiber prostoru, a težište je na identifikaciji, klasifikaciji i deskripciji onih fenomena koji se mogu podvesti pod potkategoriju 'zloupotreba kiber prostora kao sredstva masovne komunikacije'. U tom smislu, detaljno su opisani i objašnjeni fenomeni zloupotrebe kiber prostora za informaciono ratovanje i za podršku terorizmu.",
publisher = "Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd",
journal = "Vojno delo",
title = "Abuse of cyber space as means of mass communication, Zloupotreba kiber prostora kao sredstva masovne komunikacije",
volume = "64",
number = "3",
pages = "157-183"
}
Putnik, N.,& Miljković, M.. (2012). Abuse of cyber space as means of mass communication. in Vojno delo
Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd., 64(3), 157-183.
Putnik N, Miljković M. Abuse of cyber space as means of mass communication. in Vojno delo. 2012;64(3):157-183..
Putnik, Nenad, Miljković, Milan, "Abuse of cyber space as means of mass communication" in Vojno delo, 64, no. 3 (2012):157-183.