Vulnerability assessment and penetration testing in the military and IHL context

Journal Title: Vojnotehnički glasnik - Year 2017, Vol 65, Issue 2

Abstract

Vulnerability assessment and penetration testing are the key activities of information security risk management and cyber defense and intelligence done by military organizations. These activities are significant not only in the context of performing military operations, but also in the International Humanitarian Law (IHL) and law enforcement contexts. The application of information technologies in the military and civilian environments increases complexity in the field of risk management. Besides information security, military organizations have the task to undertake necessary activities in the fields of cyber operations, both for defense and offense purposes. They depend on technologically based knowledge and skills and are implemented by specific organizations within military systems. The goal of vulnerability assessment is to discover and determine the nature of vulnerabilities, without considering how they may be used for offense, while penetration testing uses exploits for breaching into systems and thus estimates the type and degree of risk these vulnerabilities represent to the system. However, even if they represent two different activities, with different end goals but the same field of interest, they are complimentary and inter-dependent. Since their common feature is development of knowledge and skills based on the same technologies, they are equally important both for risk management, military operations in cyberspace and their use for defense and intelligence activities as well as for IHL.

Authors and Affiliations

Dragan Mladenović

Keywords

Related Articles

Determining the dynamic characteristics of hydraulic excavators

This paper deals with the research into the dynamic characteristics of hydraulic excavators i.e. natural frequencies and movements. The way hydraulic excavators work is described by the mathematical model of six generali...

Modern weapons and military equipment for issue 1-2019

Russia's MiG-31: A powerful interceptor Mach 3. Current state of the German navy. New plane: an unconscious hunter bombarder of the former SFRY.

7th International Scientific Conference on Defensive Technologies OTEH-2016 (Proceedings review)

The article presents the basic information about the overall results, the significance, the international programme committee and the working areas of the 7th International Scientific Conference on Defensive Technologies...

Contractive conditions in b-metric spaces

The purpose of this paper is to consider various contractive conditions in b-metric spaces which have been recently published. Our results improve and complement many recent results from this field. Using the recently ob...

Smart field artillery information system: Model development with an emphasis on collisions in single sign-on authentication

This paper proposes a model for a Smart Field Artillery Information System (SFAIS) that can be used in a military environment. It is based on Service Oriented Architecture (SOA) and Command, Control, Communications, Comp...

Download PDF file
  • EP ID EP300336
  • DOI 10.5937/vojtehg65-10761
  • Views 111
  • Downloads 0

How To Cite

Dragan Mladenović (2017). Vulnerability assessment and penetration testing in the military and IHL context. Vojnotehnički glasnik, 65(2), 464-480. https://europub.co.uk/articles/-A-300336