The EU infocentre in Skopje

International law must address security threats emerging online.

Defending Cyberspace

April 2011, Number 02.02

“Contemporary security threats are characterized by, among other things, asymmetry and flexibility. However, in the modern world, security threats transcend the limits of the physical domain, physical security and freedom of the individual and impinge on the economic, intellectual and privacy domain. In addition to activities and relationships in the physical domain of reality, using services available over the global network — the Internet — we communicate, exchange information, perform tasks, have fun and make purchases in a parallel, virtual reality. In the Internet information cloud we leave traces of our activities, traces that connect us to other people, institutions, companies and organizations. By leaving behind this information, we unintentionally reveal more about ourselves than we would have wanted.

These traces are useful information to cybercriminals. Using this and other information, cybercrime can reach unimaginable goals. In addition to individuals who are frequent points of attack, criminals are targeting websites, information portals, e-mail systems, social networks, corporate networks or networks of governmental and nongovernmental organizations, and even other criminals...”

Excerpt from Novak Djordjijevic, “Defending Cyberspace,” per Concordiam: Journal of European Security Defense Issues 2, No. 2, 2011: 34-37.

Novak Djordjijevic is an officer in the Serbian Air Force assigned to a fighter squadron as a pilot. He previously worked in the Air Operations Centre and has broad experience in military air operations and civil-military air traffic matters. He is a 2003 graduate of the Program in Advanced Security Studies at the Marshall Center and received a master’s degree in information systems from Belgrade University and is currently preparing a doctoral thesis. He has published two books about aviation and developed an Internet site about aviation, science and information technology.

This article reflects the views of the author and are not necessarily the official policy of the United States, Germany, or any other governments.