{"title":"Analysis of Cyberattack Patterns by User Behavior Analytics","authors":"Csaba Krasznay, Balázs Péter Hámornik","doi":"10.32565/aarms.2018.3.7","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.7","url":null,"abstract":"Targeted attacks cause the most serious problems nowadays in the cyberspace, as in most cases they are used for cyber espionage, in cyber warfare activities and have a significant role in data leaks both in the governmental and private sector. Meanwhile, it is very difficult to detect such attacks in time, due to the strategy, tactics and chosen tools behind them. Therefore, a new way of cyber defense is needed to reduce risk caused by Advanced Persistent Threat (APT). In this paper we review the process of targeted cyberattacks, focusing on the challenges of authentication, then we introduce user behavior analytics (UBA) as a potential countermeasure. We also emphasize through a case study, how devastating a cyberattack can be for a company and why UBA would be a good candidate in a modern cyber defense system.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Media and Terrorism","authors":"Péter Bányász","doi":"10.32565/aarms.2018.3.3","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.3","url":null,"abstract":"Today, terrorism is one of the most significant security risks. The spread of infocommunication technologies (ICT) resulted in new types of challenges. Innovation in ICT tools represents new means that terrorists, law enforcement and armed forces have to face. Some of the actions on different platforms of social media can be included here, which can be considered a challenge for all these organizations trying to adapt to them. Today we cannot talk about cyberterrorists and cyberterrorism, nevertheless this does not mean that terrorists would not use the cyberspace or that this platform would not mean a significant threat. This study aims to examine the correlation between social media and terrorism, including psychological operations and intelligence to several other areas.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hungarians Fighting for France in Indochina","authors":"Zoltán Harangi-Tóth","doi":"10.32565/aarms.2018.3.4","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.4","url":null,"abstract":"After the Second World War, hundreds of thousands of young Hungarians became prisoners of war (POW). Most of them were transported to the east, to the Soviet Union, but still large numbers were captured by French, British or American troops after the collapse of the Third Reich. Hungarians and Germans joined the French Foreign Legion (FFL) in large numbers due to the terrible living conditions of the prison camps. Thousands of former Honvéd soldiers and members of the Hungarian Royal Levente Movement joined the Légion Étrangère to escape those camps, just to die for France in Indochina, from the mountains of Cao Bang to the fields of Dien Bien Phu. This period of the FFL is less researched than the well-known “périod hongrois” (Hungarian Period), the wave of refugees after the ill-fated 1956 Revolution. This article is about those young men, who went from a war to another just to fight on an even more lethal battlefield.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehending Gerasimov’s Perception of a Contemporary Conflict : The Way to Prevent Cyber Conflicts","authors":"R. Janczewski, Grzegorz Pilarski","doi":"10.32565/aarms.2018.3.5","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.5","url":null,"abstract":"Alongside with the appearance of the so far unknown reality called cyberspace, the new conditions of the course of conflicts emerged, consequently both the scientists as well as practitioners started to use the term cyber conflict. Unfortunately, presently there is no consistent, common view concerning a cyber conflict.The article presents a theoretical basis of cyber conflicts based on the research carried out by the authors. The article itself is an added value since it provides the suggestion and explanation of the perspective for the understanding of cyber conflicts through the prism of Gerasimov’s perception of a contemporary conflict. Moreover, it presents a new definition of a cyber conflict as the process being the system of activities. The authors also present the stages of a conflict according to Gerasimov, as well as the structure of a cyber conflict. Additionally, the article envisages the aspects of Russian attitude to conflict solving which are worth paying attention to. The presented article offers the perspective of the Russian understanding of the resolution of conflicts, it bridges the gap in research on cyber conflicts as well as assures a strong theoretical basis for the understanding of a Russian point of view on the solution of contemporary conflicts, which might be useful for counteracting cyber conflicts. The authors hold the view that the article is the incentive for further research on cyber conflicts during competition.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117179999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Roadblock: Is it an Effective Tool Against a Car Bomb?","authors":"L. Rak","doi":"10.32565/aarms.2018.3.11","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.11","url":null,"abstract":"This article serves as a short preview to the history of roadblocks (road obstacles), and also as an outlook to modern and future technologies, and challenges they face in this particular field of science. At this moment, it is a real problem to stop the car immediately (if possible), before it causes damages, or threats any civil or military objects. It does not necessarily have to be only an accident, it can be a terrorist attack, which can cause enormous collateral damage and also life losses. The contemporary problem is not only the combat with fire explosive systems, but it is also important to focus on avoiding damaging of important devices, road objects or spots called “soft targets”. All this combined presents the essential challenge for roadblocks development.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"15 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125775986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combating Cyber Crime","authors":"K. Antolis, Ivancica Varjacic, Mario Jelenski","doi":"10.32565/aarms.2018.3.2","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.2","url":null,"abstract":"Life in a modern society is determined by strategic drivers, the most important of which are the Internet and Information and Communication Technology (ICT). Their use is one that contributes to global development and enables it to be balanced globally. The sustainability of this development is directly dependent on the degree of Internet misuse and the misuse of ICT. That is why we are discussing computer criminality through the example of Croatia. In the second part, we analyse the misuse of new ICT and the ways and possibilities of legitimate opposition to ICT abuses.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Politics of Oil in the Kurdistan Region of Iraq","authors":"P. Ahmad","doi":"10.32565/aarms.2018.3.1","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.1","url":null,"abstract":"This research is aimed at identifying the role of petroleum revenues in the Kurdistan Region for better economic efficiency and sovereignty of the Kurdistan Region in the future. This study identifies some root causes of deficiency of revenue usage generally, as well as specific causes in the Kurdistan Region. Further, the study looks at the various factors that affect oil production in the Kurdistan Region and compares it to the Federal Government. This study seeks to show how the Kurdistan Region generates the oil reserves regionally, despite the difficulties it encounters with the Federal Government due to the constitutional ambiguity. The research analysis concludes the importance of energy efficiency for the Kurdistan Region both economically and politically.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of Phishing and Business Email Compromise Campaigns in the Czech Republic","authors":"Jan Kolouch","doi":"10.32565/aarms.2018.3.6","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.6","url":null,"abstract":"Cyberspace is an environment in which cyber-attacks can be committed. Fraudulent attacks are one of the oldest cyber-attacks of all. The aim of this article is to familiarize the reader with the evolution of phishing and Business Email Compromise (BEC) attacks that occurred to a large extent in the cyberspace of the Czech Republic from 2014 to 2018. The article describes scam, phishing and BEC definitions, as well as individual ways of implementing specific attacks. Special attention is also paid to the possible criminal liability of the attacker for the described cyber-attacks, both according to the international legal regulations (enshrined in the Convention on Cybercrime) and according to the legislation of the Czech Republic.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132389711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Milestones Related to the Development of Organizational Aspects of Cybersecurity and Protection against Cyber-Threats in the Czech Republic","authors":"Oldřich Krulík","doi":"10.32565/aarms.2018.3.8","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.8","url":null,"abstract":"Although the Czech Republic belongs to the most “internetised” countries in the world, its information and communication security policy (as well as the protection of the critical information infrastructure) lagged behind for a relatively long time, when compared to most of the remaining European countries. Building the hierarchy regarding the umbrella teams of the Cybernetic Emergency Response Teams (CERT) and Computer Security Incident Response Teams (CSIRT) type (regardless of whether we call them governmental, national or otherwise) was unthinkable without the contribution of the private sector that substituted many functions of the state in this field. The whole process can be understood as an interaction of international and national pressures appealing to the solution of the situation.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonverbal Communication of Prison Subculture through Criminal Tattoo Symbols","authors":"Barbora Vegrichtová","doi":"10.32565/aarms.2018.3.13","DOIUrl":"https://doi.org/10.32565/aarms.2018.3.13","url":null,"abstract":"The paper discusses the importance of tattoo in the criminal environment and prison subculture. Special attention is paid to the function of tattoos, especially in the area of identification and communication. Frequently used symbols have a considerable explanatory value. They reflect the criminal past of the wearer, expressing religious or ideological beliefs, indicate a process of radicalisation, membership in a criminal group or gang. With the help of analysis of the selected tattoo symbols, it is possible to collect valuable information about the personality profile of a particular individual. The findings presented in the paper are based on the original research project realised in the prison facilities in the Czech Republic.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}