National security and the challenges of the digital age

Digital technologies, in addition to the many benefits they provide to humanity, are increasingly becoming a tool in the hands of cybercriminals. Cyberspace can no longer be considered a place where Internet users can feel safe while performing their activities, such as communicating with other virt...

Full description

Bibliographic Details
Main Authors: Lakušić Milovan, Baltezarević Ivana
Format: Article
Language:English
Published: University Dzon Nezbit 2022-01-01
Series:Megatrend Revija
Subjects:
Online Access:https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2022/1820-31592202145L.pdf
_version_ 1797668074961240064
author Lakušić Milovan
Baltezarević Ivana
author_facet Lakušić Milovan
Baltezarević Ivana
author_sort Lakušić Milovan
collection DOAJ
description Digital technologies, in addition to the many benefits they provide to humanity, are increasingly becoming a tool in the hands of cybercriminals. Cyberspace can no longer be considered a place where Internet users can feel safe while performing their activities, such as communicating with other virtual members, searching for information, doing business or searching for entertainment content. Many sources of information cannot be considered credible, but unfortunately a large percentage of the population, due to insufficient levels of digital literacy, cannot recognize this. There are countless examples in which cyber attackers harm gullible people, most often through social networks, causing them material and emotional damage. In some other cases, such attacks in a cyber environment can take much more complex forms and damage even the states themselves. As in the case of traditional terrorism in the real world, cyber terrorism has the same motives, to provoke fear in one part of the population, in order to put pressure on the government to meet their conditions. However, unlike traditional terrorism, instead of weapons, cyber terrorism uses digital tools to spread propaganda, recruit ideological like-minded people or organize terrorist attacks. In more serious cases, cyber terrorists can also threaten the critical infrastructure of the state, which directly affects national security. The costs of such cyber action are low, so that even after one failed attempt, the attackers do not lose motivation to try again. The hackers' adaptability to technological innovations and updates is at an enviable level, which must be an alarm that will force governments to cooperate with each other and regularly improve cyber security strategies and thus protect their population, critical infrastructure and economic development.
first_indexed 2024-03-11T20:23:48Z
format Article
id doaj.art-ec69d36da2234f7291d6d5feb7722194
institution Directory Open Access Journal
issn 1820-3159
2560-3329
language English
last_indexed 2024-03-11T20:23:48Z
publishDate 2022-01-01
publisher University Dzon Nezbit
record_format Article
series Megatrend Revija
spelling doaj.art-ec69d36da2234f7291d6d5feb77221942023-10-02T22:18:01ZengUniversity Dzon NezbitMegatrend Revija1820-31592560-33292022-01-0119214515410.5937/MegRev2202145L1820-31592202145LNational security and the challenges of the digital ageLakušić Milovan0Baltezarević Ivana1Megatrend University, Faculty of Law, Belgrade, SerbiaMegatrend University, Faculty of Law, Belgrade, SerbiaDigital technologies, in addition to the many benefits they provide to humanity, are increasingly becoming a tool in the hands of cybercriminals. Cyberspace can no longer be considered a place where Internet users can feel safe while performing their activities, such as communicating with other virtual members, searching for information, doing business or searching for entertainment content. Many sources of information cannot be considered credible, but unfortunately a large percentage of the population, due to insufficient levels of digital literacy, cannot recognize this. There are countless examples in which cyber attackers harm gullible people, most often through social networks, causing them material and emotional damage. In some other cases, such attacks in a cyber environment can take much more complex forms and damage even the states themselves. As in the case of traditional terrorism in the real world, cyber terrorism has the same motives, to provoke fear in one part of the population, in order to put pressure on the government to meet their conditions. However, unlike traditional terrorism, instead of weapons, cyber terrorism uses digital tools to spread propaganda, recruit ideological like-minded people or organize terrorist attacks. In more serious cases, cyber terrorists can also threaten the critical infrastructure of the state, which directly affects national security. The costs of such cyber action are low, so that even after one failed attempt, the attackers do not lose motivation to try again. The hackers' adaptability to technological innovations and updates is at an enviable level, which must be an alarm that will force governments to cooperate with each other and regularly improve cyber security strategies and thus protect their population, critical infrastructure and economic development.https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2022/1820-31592202145L.pdfdigital technologiescyberspacecyber-attackcyber terrorismnational security
spellingShingle Lakušić Milovan
Baltezarević Ivana
National security and the challenges of the digital age
Megatrend Revija
digital technologies
cyberspace
cyber-attack
cyber terrorism
national security
title National security and the challenges of the digital age
title_full National security and the challenges of the digital age
title_fullStr National security and the challenges of the digital age
title_full_unstemmed National security and the challenges of the digital age
title_short National security and the challenges of the digital age
title_sort national security and the challenges of the digital age
topic digital technologies
cyberspace
cyber-attack
cyber terrorism
national security
url https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2022/1820-31592202145L.pdf
work_keys_str_mv AT lakusicmilovan nationalsecurityandthechallengesofthedigitalage
AT baltezarevicivana nationalsecurityandthechallengesofthedigitalage