CONTEMPORARY MACEDONIAN DEFENCE No 37

CONTEMPORARY MACEDONIAN DEFENCE No 37

UDK 355/359 CODEN SMOOAM ISSN 1409-8199 МЕЃУНАРОДНО НАУЧНО СПИСАНИЕ 37 MINISTRY OF DEFENCE REPUBLIC OF NORTH MACEDONIA ONTEMPORARY ACEDONIAN CM EFENCE Vol. 19, Number 37, 2019D 37 VOL. XIX SKOPJE DECEMBER 2019 СОВРЕМЕНА МАКЕДОНСКА ОДБРАНА Год. Број Стр. Скопје 19 37 1-127 2019 CONTEMPORARY MACEDONIAN DEFENCE Vol. No pp Skopje MINISTRY OF DEFENCE REPUBLIC OF NORTH MACEDONIA CONTEMPORARY MACEDONIAN DEFENCE ISSN 1409-8199 e-ISSN 1857-887X Година 19, бр. 37, декември 2019 / Vol. 19, No. 37, December 2019 Skopje December 2019 MINISTRY OF DEFENCE REPUBLIC OF NORTH MACEDONIA ONTEMPORARY ACEDONIAN CM EFENCE Vol. 19, Number 37, 2019D Izdava~: MINISTERSTVO ZA ODBRANA NA REPUBLIKA SEVERNA MAKEDONIJA Ministerstvo za odbrana „SOVREMENA MAKEDONSKA ODBRANA“ „Orce Nikolov“ 116 1000 Skopje Telefoni: 02 3128 276, 02 3113 527 Internet adresa: WEB na Ministerstvoto za odbrana: http://www.morm.gov.mk/sovremena-makedonska-odbrana/ Spisanieto izleguva dva pati godi{no. ISSN 1409-8199 Скопје, декември 2019 година Site prava se rezervirani Se zabranuva reproducirawe na publikacijata i nejzinite delovi, kako i nivno transformirawe vo razni mediumi: elektronski, magnetni lenti, mehani~ko fotokopirawe, snimawe i drugo, bez pismeno odobrenie na izdava~ot i avtorite. CONTEMPORARY MACEDONIAN DEFENCE Publisher: MINISTRY OF DEFENCE OF THE REPUBLIC OF NORTH MACEDONIA Ministry of Defence „CONTEMPORARY MACEDONIAN DEFENCE“ „Orce Nikolov“ 116 1000 Skopje Tel.: 02 3128 276, 02 3113 527 Internet address: WEB of the Ministry of Defence: www.morm.gov.mk/contemporary-macedonian-defence/ The magazine is published twice a year ISSN 1409-8199 Skopje, December 2019 All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means: electronic, electrostatic, magnetic tape, mechanical photocopying, recording or othewise, without permission in writing from the publisher and authors. МЕЃУНАРОДНО НАУЧНО СПИСАНИЕ НА МИНИСТЕРСТВОТО ЗА ОДБРАНА НА РЕПУБЛИКА СЕВЕРНА МАКЕДОНИЈА Радмила ШЕКЕРИНСКА, претседател на Издавачкиот совет Марина МИТРЕВСКА, главен и одговорен уредник Беким МАКСУТИ, заменик главен и одговорен уредник МЕЃУНАРОДЕН УРЕДУВАЧКИ ОДБОР Мухамед РАЦАЈ Нано РУЖИН Тони МИЛЕСКИ Николина КЕНИГ Никола ДУЈОВСКИ Наташа ПЕЛИВАНОВА Ана ЧУПЕСКА Александра ДЕАНОСКА ТРЕНДАФИЛОВА Елениор НИКОЛОВ Менде СОЛУНЧЕВСКИ Џелал НЕЗИРИ Жанет РИСТОСКА Паскал МИЛО Антон ГРИЗОЛД Зоран КЕКОВИЌ Синиша ТАТАЛОВИЌ Јанцислав ЈАНАКИЕВ Дезире ПАНГЕРЦ Оливера ИЊАЦ Мајкл ШУЛЦ Патриција ФАРАЛДО КАБАНА Емануела Ц. ДЕЛ РЕ Еике АЛБРЕХТ Секретар: Жанет РИСТОСКА Техничка подготовка: „СТУДИО НАМПРИНТ“ ДООЕЛ Скопје CONTEMPORARY MACEDONIAN DEFENCE INTERNATIONAL SCIENTIFIC JOURNAL OF THE MINISTRY OF DEFENCE OF THE REPUBLIC OF ΝΟRΤΗ MACEDONIA Radmila SHEKERINSKA, Chairperson of the Editorial Board Marina MITREVSKA, Editor–in-Chief Bekim MAKSUTI, Co-Editor–in-Chief INTERNATIONAL EDITORIAL BOARD Muhamed RACAJ Nano RUZHIN Toni MILESKI Nikolina KENIG Nikola DUJOVSKI Natasha PELIVANOVA Ana CHUPESKA Aleksandra DEANOSKA TRENDAFILOVA Elenior NIKOLOV Mende SOLUNCHEVSKI Djelal NEZIRI Zhanet RISTOSKA Paskal MILO Anton GRIZOLD Zoran KEKOVIĆ Siniša TATALOVIĆ Yantislav YANAKIEV Desirėe PANGERC Olivera INJAC Michael SCHULZ Patricia FARALDO KABANA Emanuela C. DEL RE Eike ALBRECHT Secretary: Zhanet RISTOSKA Processing: "STUDIO NAMPRINT" DOOEL Skopje Proofreading and Editing: Rozi GROZDANOVSKA, Martina KIMOVSKA CONTENTS: Giacomo ASSENZA, Roberto SETOLA OPERATIONAL TECHNOLOGY CYBERSECURITY: HOW VULNERABLE IS OUR CRITICAL INFRASTRUCTURE? ............................................................................9 Metodi HADJI JANEV HYBRID THREATS AND INTERNATIONAL LAW: ECONOMY AND THE USE OF FORCE IN SPECIFIC CONTEXT .................................................................21 Monika BEGOVIĆ IMPORTANCE OF EURO-ATLANTIC VALUES IN REDEFINING THE SECURITY AGENDA IN SOUTHEAST EUROPE .....................................................33 Jovan MANASIJEVSKI THE MILITARIZATION OF THE EU’S APPROACH TOWARDS MIGRATION .........45 Mladen NAKIĆ, Mina EFREMOVSKA COMPARISON OF ISLAMIC STATE OF IRAQ AND THE LEVANT AND AL-QAEDA ......................................................................................................................55 Aleksandar PETROVSKI Nenad TANESKI ONE BELT ONE ROAD – HOW DOES IT AFFECT THE EURASIAN ECONOMIC AND SECURITY ISSUE ..........................................................................................................69 Goce ANAKIEVSKI Rose SMILESKI METODOLOGICAL ASPECTS OF THE RESEARCH OF EXPLOSIONS IN THE REPUBLIC OF NORTH MACEDONIA IN THE PERIOD FROM 2006 TO 2011 – INSTITUTIONAL APROACH ................................................................................................79 Andrej ILIEV Zlatko STOJOVSKI ANALYSIS OF MILITARY-ECONOMIC REFORMS ON THE REPUBLIC OF NORTH MACEDONIA WITH SOUTH-EAST EUROPEAN COUNTRIES AS A PRECONDITION FOR NATO ACCESSION ........................................................................95 Zlatko KUZMANOV Goran ZENDELOVSKI MILITARY BASES OF THE GREAT POWERS IN THE BALKANS IN FUNCTION OF REALIZATION OF THEIR GEOSTRATEGIC INTERESTS .............113 INTERNATIONAL SCIENTIFIC JOURNAL Original scientific article 355.422.1:004.7 OPERATIONAL TECHNOLOGY CYBERSECURITY: HOW VULNERABLE IS OUR CRITICAL INFRASTRUCTURE? Giacomo ASSENZA, Roberto SETOLA1 Acknowledgment: We would like to thank Andrea Chiappetta2 and Luca Faramondi3 for their valuable comments and essential contribution. Abstract: The employment of OT (Operational Technology) in Critical Infrastructure has largely increased in recent years due to several benefits related to the improvement of efficiency, quality of production, and cost reduction. Unfortunately, the use of these technologies exposes the plants to cyber threats. Indeed, a cyber-attack may cause not only a production interruption, but it could also manipulate the control process in order to induce catastroph- ic events. This article will provide background on industrial control systems, highlighting their architecture, the critical sectors in which they operate and what makes them so vul- nerable, including a focus on the role of Firmware and its vulnerabilities. Also, it will dis- cuss the new ICS business driven trends analysing their impact on security. Finally, it will review relevant features of some of the occurred cyberattacks that caused physical harm. Key Words: Cyber-security; Operational Technology; Cyber-Threat; Cyber-physical Systems; Introduction In recent years, cyberattacks targeting OT have emerged as another possible initiator of malicious accident chains. Cyber security threats are becoming a growing concern for all those industrial areas in which automation is pervasive, which includes several sectors, such as the energetic, petrochemical, nuclear etc., that are crucial for the functioning of a modern society and in which the critical infrastructure of a state operates. Recent business-driven trends such as the move to IT (Information Technology) standards and increasing connectivity have made OT extremely vulnerable and unsecure. The problem is that the OT has several peculiarities that make the implementation of the protection measures that are usually adopted for the IT systems difficult and problematic. 1 Complex System & Security Lab – University UCBM, Via A. del Portillo, 21, 00128 Roma (Italy) 2 CEO ASPISEC, Piazzale Flaminio 19 – 00196 Roma (Italy) 3 Complex System & Security Lab – University UCBM, Via A. del Portillo, 21, 00128 Roma (Italy) CONTEMPORARY MACEDONIAN DEFENCE 9 INTERNATIONAL SCIENTIFIC JOURNAL These trends have also led to a transformation of the source and nature of the threat. If before the main risk concern were the internal attackers, today the majority of attacks originate externally. Also, as demonstrated by episodes like Stuxnet, Irongate, BlackEnergy 3, Crashover- ride and Trisis, cyberattacks became liable to cause kinetic effects, thus able to induce failures and to bring the industrial processes to mechanical break points preventing the malicious manipulation from being noticed. For example, a sophisticated offensive team called the Equa- tion Group, developed a module that allowed them to install malicious data in the firmware of hard disks, making it more difficult to detect and repair. This article will provide background on industrial control systems, highlighting their architecture, the critical sectors in which they operate and what makes them so vulnerable, including the role of firmware. Also, it will discuss the new ICS business driven trends analysing their impact on security. Finally, it will review the relevant features of some of the occurred cyberattacks that caused physical harm. 1. Operational technology Operational Technology (OT) is an integral part of industrial processes world- wide. OT are systems of interconnected assets, devices and subsystems which employs information and communication technologies (ICTs) to oversee, manage and automate industrial operations in a variety of structures such as electric grids, chemical production and refining infrastructure (Hayden, Assante, & Conway, 2014). Broadly, there are two primary kinds of OT: Distributed Control Systems (DCS), used to administer processes concentrated in a specific area, and Supervisory Control and Data Acquisition (SCADA) systems, employed in geographically dispersed facil- ities. As an example, a gas plant would rely on DCS for the refining process and on a SCADA for managing distribution and monitoring pipelines (Drias, Serhrouchni,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    132 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us