Our website uses cookies. For some of them we need your consent. Edit consent...

MoD Library and Information System

Show document
  • A-
  • A+
  • English (UK)
  • Slovenščina

Title:Tradicionalno proti netradicionalnemu : opredelitev asimetričnega ogrožanja varnosti
Authors:Babič, Drago (Author)
Unger, Marko (Mentor) More about this mentor... New window
Language:Slovenian
Work type:Specialist thesis
Organization:PŠŠ - Command and Staff School
Abstract:Asimetrično bojevanje se pogosto uporablja za opis neprimerljivosti, neenakosti, različnosti sodelujočih akterjev v konfliktu. Med izvajalce asimetričnega bojevanja štejemo državne, skupine in posameznike. Med glavne asimetrične grožnje prihodnosti prištevamo kibernetske grožnje, terorizem, JRKB dogodke ter delovanje gverilskih in odporniških skupin proti pripadnikom SV na OKO. Zaščita države na asimetrične grožnje zajema zaščito kritične infrastrukture, sposobnost odkritja zaznavnih in dejanskih groženj ter zmožnost odgovora - asimetričnega bojevanja.
Keywords:asimetrično bojevanje, kritična infrastruktura, kibernetske grožnje, terorizem, JRKB grožnje
Year of publishing:2013
Publisher:[D. Babič]
Source:Maribor
UDC:355.425(043.4)
COBISS_ID:5227982 Link is opened in a new window
Views:8327
Downloads:379
Files:.pdf SPEC_Babic_Drago_i2013.pdf (389,57 KB)
MetadataXML DC-XML DC-RDF
Categories:Document is not linked to any category.
:
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:AddThis
AddThis uses cookies that require your consent. Edit consent...

Secondary language

Language:English
Abstract:Asymmetric warfare is often used to describe the non-comparability of inequality, diversity of actors involved in the conflict. Performers of asymmetric warfare are states, groups and individuals. The main asymmetric future threats are cyber threats, terrorism, CBRN events, and operation of guerrilla and resistance groups, against the Slovenian army in a peace mission. Protection of the country, against to asymmetric threats, include protecting of critical infrastructure, ability to detect perceptual and real threats and the ability to answer - asymmetric warfare.
Keywords:asymmetrical warfare, critical infrastructure, cyber threats, terrorism, CBRN threat

Comments

Leave comment

To comment you have to login.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
www.mo.gov.si Colophon   | Cookie settings Top