About Me

I am military officer at Hellenic Army; Cisco CCNA certified; and Ph.D. student. My current research interests include Cyber Ranges (CRs) platforms, and searching for educational models and methods for computer network management and security (CNMS).
[...] Cybersecurity is a continuous process of protecting general critical infrastructures (GCIs), information technology networks (ITNs), and cyber-physical systems (CPSs) from attack, damage, or unauthorized access. Ensuring a safe work environment is instrumental and one of the global challenges against cyber threats and crimes. To meet this mission-critical need, an educational and experimental platform is required for cybersecurity exploration and participants’ skills improvement. Adopting CRs platforms for education in the cyber domain has emerged as a promising solution.
Cyber-attacks against infrastructures, systems, and networks occur daily, many of these on a large scale and at an alarming rate. Gartner's report predicts that by 2024 at least 50% of organizations will use AI-driven security programs to detect cyberattacks. The advent of smart computers and networks with extensive communication capabilities yields new vulnerabilities due to a high dependency on cyber information. To combat threats and protect enterprises and critical assets such as unified CPSs, [including physical systems, computer systems, industrial control systems, and Internet of Things (IoT)], data, and production services while ensuring a safe environment for work, it is fundamental to implement unique education platforms.
Cyber-knowledge is best learned by practice on hyper-realistic platforms because practicing on production systems is not considered appropriate. As such, CRs platforms have been developed, where participants (i.e., students, professionals, etc.) may prepare, and improve their cybersecurity posture (i.e., basic, intermediate, professional, etc.), and hone their knowledge (i.e., security, analytics, etc.). CRs provide cyber activities that operate like real-world systems, in the context of realistic true-to-life scenarios [...].

Contact Info

Dionysis Stamatopoulos
Athens, Greece
diostam@yahoo.gr
admin@diostam.info


Education

University of Macedonia

Ph.D. Student - Department of Applied Informaticssince June 2022

Scientific College of Greece

Cisco Certified Network Associate September 2020

Athens University of Economics and Business

Master in Information Systems July 2019

School Of Computer Programmers

Information Systems Administrator - Military Academy December 2012

ECDL Foundation

European Computer Driving Licence September 2001

SMY - Military Academy | Hellenic Army

Technical Support of Telecomunications Systems June 1998

Seminars

Cybercrime - Threats, Trends and Future Challenges

ISACA Athens Chapter June 2022

Cybersecurity Essentials

Cisco Certified Accademy December 2020

Student Certificate CyberSecurity Attendance

National Centre for Public Administrator and Local Government july 2019

Conferences

Greek ICT Forum February 2018

Greek ICT Forum October 2017

info

Internet World !

Imagine a world without the Internet. No more Google, YouTube, instant messaging, Facebook, Wikipedia, online gaming, Netflix, iTunes and easy access to current information. No more price comparison websites, avoiding lines by shopping online, or quickly looking up phone numbers and map directions to various locations at the click of a button. How different would our lives be without all of this? That was the world we lived in just 15 to 20 years ago. But over the years, data networks have slowly expanded and been repurposed to improve the quality of life for people everywhere . . . [Cisco, 2020]

What is Cybersecurity

sample-image The connected network has become an integral part of our daily lives. All types of organizations, such as medical, financial, and education institutions, use this network to operate effectively. They utilize the network by collecting, processing, storing, and sharing vast amounts of digital information. As more digital information is gathered and shared, the protection of this information is becoming even more vital to our national security and economic stability. Cybersecurity is the ongoing effort to protect these networked systems and all of the data from unauthorized use or harm. On a personal level, you need to safeguard your identity, your data, and your computing devices. At the corporate level, it is everyone’s responsibility to protect the organization’s reputation, data, and customers. At the state level, national security, and the safety and well being of the citizens are at stake. [Cisco, 2020] - [Photo Internet]


What is Cybersecurity Engineering

sample-image Security engineering is about building systems to remain dependable in the face of malice, error, or mischance. As a discipline, it focuses on the tools, processes, and methods needed to design, implement, and test complete systems, and to adapt existing systems as their environment evolves. Security engineering requires cross-disciplinary expertise, ranging from cryptography and computer security through hardware tamper-resistance and formal methods to a knowledge of applied psychology, organizational and audit methods and the law. System engineering skills, from business process analysis through software engineering to evaluation and testing, are also important; but they are not sufficient, as they deal only with error and mischance rather than malice. Many security systems have critical assurance requirements. Their failure may endanger human life and the environment (as with nuclear safety and control systems), do serious damage to major economic infrastructure (cash machines and other bank systems), endanger personal privacy (medical record systems), undermine the viability of whole business sectors (pay-TV), and facilitate crime (burglar and car alarms). Even the perception that a system is more vulnerable than it really is (as with paying with a credit card over the Internet) can significantly hold up economic development. The conventional view is that while software engineering is about ensuring that certain things happen (“John can read this file”), security is about ensuring that they don’t (“The Chinese government can’t read this file”). Reality is much more complex. Security requirements differ greatly from one system to another. One typically needs some combination of user authentication, transaction integrity and accountability, fault tolerance, message secrecy, and covertness. But many systems fail because their designers protect the wrong things, or protect the right things but in the wrong way. [Ross Anderson Cambridge, January 2001] - [Photo Internet]


What is Social Engineering

sample-image Social engineering is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information. Social engineers often rely on people’s willingness to be helpful but also prey on people’s weaknesses. For example, an attacker could call an authorized employee with an urgent problem that requires immediate network access. The attacker could appeal to the employee’s vanity, invoke authority using name dropping techniques, or appeal to the employee’s greed. [Cisco, 2020] - [Photo by new.psu.edu]


What is Security Vulnerabilities

sample-image Security vulnerabilities are any kind of software or hardware defect. After gaining knowledge of a vulnerability, malicious users attempt to exploit it. An exploit is the term used to describe a program written to take advantage of a known vulnerability. The act of using an exploit against a vulnerability is referred to as an attack. The goal of the attack is to gain access to a system, the data it hosts or to a specific resource. [Cisco, 2020] - [Photo Internet]


What is OWASP Top Ten

sample-image OWASP Top 10 is one of the organization's best-known projects. OWASP Top 10 is a ranking of the ten most dangerous information security risks for web applications, compiled by a community of industry experts. For each point of the rating, the risk is calculated by experts based on the OWASP Risk Rating Methodology and includes an assessment of Weakness Prevalence, Weakness Detectability and Exploitability, as well as the criticality of the consequences of their operation or Technical Impacts. [Photo by owasp]

Networking Fundamentals

sample-image A network connects two or more computers to communicate with each other or for the exchange of information among the systems. Networking is sharing of the resources within a network. In basic communication, there are three components involved: the sender, the receiver, and the media. In the case of two people communicating with each other face to face, within a short distance, the media could be just air. Communication is completed only when the sender and receiver understand each other and are able to comprehend the information. In order to comprehend the information that is being exchanged between the sender and the receiver, the communication "protocol" could be common "language". Protocol is a set of rules defined by the communication channel in order to comprehend the information that is being exchanged and in normal human communication, it is a common language understood by both the parties. Let’s say that the sender understands a different language and the receiver understands a different language. For discussion’s sake, let’s say the sender understands French and the receiver understands Greek. Assume that both have to exchange information, the media is Facsimile (FAX) in France and Telegraph in Greece. This communication has increased the complexity as both sender and receiver do not have a common language and there is no common media. The communication needs translators who understand both the languages or two translators – one who understands the sender’s language (e.g., French) and another common language (e.g., English), another who understands a common language (e.g., English) and the receiver’s language (e.g., Greek). These translators translate to the senders and receivers. A media translator transfers facsimile information on to the telegraphic information and vice versa.
[Apress open, The infosec Handbook] - [Photo Internet]


Network Vulnerabilities and Threats

sample-image With the advancement in computing, networking, and technology, the world is becoming more and more connected. Internet connects millions of computers and most of the geographies of this world. The Internet is a network of networks and consists of billions of users across private, public, university, and government networks sharing information across the networks. The Internet uses TCP/IP protocol and the underlying physical media can be wire, optical, or wireless technologies. The Internet serves an extensive range of applications, starting with e-mail, the World Wide Web (www), and social networks. Each application may use one or more protocols. There is a large amount of personal, commercial, business, government, and military information being shared on the Internet. There are billions of users, both good and bad, accessing the Internet. The bad guys, known as hackers and such other persons with malicious intent are a concern. With so many computers, networking devices, protocols, and applications on the network, it has become a serious threat to information security. Any application, network device, or protocol can be vulnerable. The internet is crawling with people from all over the world who are continuously trying to test the security of various systems and networks. Some are simply testing for fun and others are fuelled by treacherous motives of stealing or revenge.
A threat is an event that can occur by taking advantage of any vulnerabilities that exist in the network. Any discussion on network security will include these three common terms:
• Vulnerability: An inherent weakness in the network, and network device. It could be hardware or software or both. Possible vulnerabilities could include routers, switches, servers, and security devices themselves.
• Threat: A threat is what can go wrong because of the exploit of the vulnerabilities or attack on the assets, such as data theft or unauthorized modification of the data.
• Attack: An attack is an unauthorized action with the intent to cause damage, or hinder or breach security of a network. An attack is launched by intruders to damage the network and network resources such as end-point devices, servers, or desktops which are vulnerable. [Photo by alpinesecurity]

TCP/IP Model

sample-image The TCP/IP protocol model for internetwork communications was created in the early 1970s and is sometimes referred to as the Internet model. As shown in the figure, it defines four categories of functions that must occur for communications to be successful. The architecture of the TCP/IP protocol suite follows the structure of this model. Because of this, the Internet model is commonly referred to as the TCP/IP model. Most protocol models describe a vendor-specific protocol stack. Legacy protocol suites, such as Novell Netware and AppleTalk, are examples of vendor-specific protocol stacks. Because the TCP/IP model is an open standard, one company does not control the definition of the model. The definitions of the standard and the TCP/IP protocols are discussed in a public forum and defined in a publicly available set of RFCs. [Cisco]- [Photo Internet]


OSI Model

sample-image The OSI model provides an extensive list of functions and services that can occur at each layer. It also describes the interaction of each layer with the layers directly above and below. The TCP/IP protocols discussed in this course are structured around both the OSI and TCP/IP models. The functionality of each layer and the relationship between layers will become more evident throughout this course as the protocols are discussed in more detail.
[Cisco] - [Photo Internet]


Virtual networking

sample-image Virtual networking enables communication between multiple computers, virtual machines (VMs), virtual servers, or other devices across different office and data center locations. While physical networking connects computers through cabling and other hardware, virtual networking extends these capabilities by using software management to connect computers and servers over the Internet. It uses virtualized versions of traditional network tools, like switches and network adapters, allowing for more efficient routing and easier network configuration changes. Virtual networking enables devices across many locations to function with the same capabilities as a traditional physical network. This allows for data centers to stretch across different physical locations, and gives network administrators new and more efficient options, like the ability to easily modify the network as needs change, without having to switch out or buy more hardware; greater flexibility in provisioning the network to specific needs and applications; and the capacity to move workloads across the network infrastructure without compromising service, security, and availability. [vmware]


Network automation

sample-image Network automation is the process of automating the configuring, managing, testing, deploying, and operating of physical and virtual devices within a network. With everyday network tasks and functions automated and repetitive processes controlled and managed automatically, network service availability improves. Any type of network can use network automation. Hardware- and software-based solutions enable data centers, service providers, and enterprises to implement network automation to improve efficiency, reduce human error, and lower operating expenses. [Cisco]

Quotes

I believe that building systems that continue to perform robustly in the face of malice is one of the most important, interesting, and difficult tasks facing engineers in the twenty-first century.

Ross Anderson

It is relatively easy to build an encryption system that is secure if it is working as intended and is used correctly it is still very hard to build a system that does not compromise its security in situations in which it is either misused or one or more of its sub-components fails (or is ‘encouraged’ to misbehave) ... this is now the only area where the closed world is still a long way ahead of the open world and the many failures we see in commercial cryptographic systems provide some evidence for this.

Brian Gladman

Reading

The predecessor of the Internet, the Advanced Research Projects Agency Network (ARPANET) was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). Established in 1969, ARPANET served as a testing ground for new networking technologies, linking many universities and research centers. The first two nodes that formed the ARPANET were UCLA and the Stanford Research Institute, followed shortly thereafter by the University of Utah. Some of the reasons for creating ARPANET include making it easier for people to access computers, to improve computer equipment, and to have a more effective communication method for the military. With increasing threats to security, government agencies in charge of ARPANET came up with the Computer Emergency Response Team (CERT): the first network security organization in 1988. The purpose of CERT is to spread security awareness among users and find ways to mitigate security breaches.

Today we are living in the Internet and World Wide Web (WWW) era, where everyone is connected. The Internet has changed the way we communicate with each other. The Web allowed information to be accessed instantly from anywhere in the world. First-generation web 1.0 was just a static web. Web 2.0, called interactive web, allowed the users to communicate by emphasizing online collaboration. Web 3.0 technology called "Semantic Web" emphasized machine-facilitated understanding of information to provide a more intuitive user experience. The Web has become a social medium where we can interact with one another, which has unfortunately resulted in many threats and vulnerabilities and an increasing number of security breaches. Some of the popular attacks include "Mellisa, the love bug", the "killer resume", and "The code red" [Timeline of Computer virus and worms]. The 1990's saw more hacking activities such as the "Michelangelo" virus and the arrest of notorious hacker Kevin Mitnick for stealing credit card data, and the 1998 Solar Sunrise attack targeting Pentagon computers by Ehud Tenebaum.

While a set of scientists work toward securing the network and the information that flows on the network, there is another set of phreaks who challenge the scientists by breaking into the network and the information by cracking the security codes. Hackers are intruders who are as capable and knowledgeable as the scientists, but instead of securing the system, they break into the system, thus undoing all the hard work that the scientists have put in. However, there is a new category of security professionals known as "ethical hackers", who try to help the industry and governments to unearth the security risks. These are the good guys and are known as the "white hats" whereas the bad guys are typically known as the "black hats". The early days of telephone networking witnessed hackers making long-distance calls without actually paying. Hackers used electronic devices to crack into the telephone network to make long-distance calls. The telephone network hackers became popularly known as phreakers. During the same time, the term “cracker” originated as a name for people who crack the system’s security, often by cracking the system’s password.

Without people there is no need for or possibility of any information security. People are the strongest pillars of the information security on the one side. But, they may sometimes tend to be the weakest pillars because of the lack of awareness or bad motives. They are easily prone to social engineering attacks or other malicious attacks. Hence, for strong information security their awareness, vigilance, and positive involvement must be increased and ensured.

Access control provides limits on who can access which resources and what he or she can do with it. The user needs to be identified before he can be given access to the organizational information. Access must first be granted by administrative policies, then the technical controls, and finally, physical access. There are various authentication techniques that organizations can implement and are broadly classified under three layers – administrative, technical, and physical.

Traditionally, passwords were the only form of access control. However, passwords were also easily prone to being guessed or cracked. Strong passwords are one of the absolute requirements in today’s world which is technologically advanced and the technology can crack the passwords in a matter of seconds if they are found to be weak. The passwords can be "static", "dynamic" or a combination of both.

Data encryption protects information from the loss of confidentiality and integrity because it requires a key to decipher the encrypted information and this key is available only with the intended recipient. Encryption provides sufficient security to the information, either stored or transmitted, unless the encryption algorithm is weak, the encryption key is weak, or the encryption key is not well protected. Encryption, if well implemented, can provide access to only the authorized personnel.

Technical controls are usually introduced through or on technological products, tools, or utilities. These again help the organization to either prevent or detect or contain inappropriate and improper access controls. Some of these are passwords, smart cards, encryption, network access controls, and system access controls. Smartcards normally complement password controls. These provide an additional layer of security by adding another layer to gain access. These may be implemented through various technologies like HID, RFID, or Chip-based smart cards. There are various levels of access possible to operating systems as well as to applications. These need to be set up appropriately on a need-to-know and a need-to-do basis. Giving administrative privilege to all users for operating systems can lead to serious infections or violations. Similarly, giving unlimited access to applications should be avoided or it will lead to serious integrity issues.

Physical access controls are again one of the important layers of either preventive or detective controls which supplement or complement other forms of control in mitigating the risk of inappropriate or improper access and modifications to the information. For ease of understanding, let us assume that you are an IT service provider organization and you work for two competing banks. It is necessary that the information pertaining to one bank is not accidentally or intentionally accessed by the personnel who work for the other bank. Physical segregation of the two networks can help ensure high confidence to the customers. Clearly identifying the organizational boundaries and ensuring that the perimeter is secured, restricts improper and inappropriate access to the organizational resources. Some of the important controls of use are electrical fences, microwave barriers, CCTV cameras, and sensor-based intrusion detection systems [IDS].

The word “computer Virus” was coined by Fred Cohen, a student from University of Southern California. The history of computer viruses started in the year 1982, with the virus 'Elk Cloner’. ‘Elk Cloner’ (1982) infected the Apple II Operating System, whereas the next virus, ‘Brain' (1986), which had its root in Pakistan, impacted the boot sector. In 1987, IBM Christmas Worm originated. In 1988, Robert Morris released an Internet Worm which impacted a significant number of computers. In 1998, the spamming of AOL Trojans affected the users of AOL e-mail facility. Melissa hit in 1999 and was the first mass-mailing e-mail virus. Subsequently, ILOVEYOU worm infected systems around the world, in the year 2000. The "Melissa" and "ILOVEYOU" viruses overwrote and deleted files on a huge number of PC's around the world, and used contact lists of users to enable their replication and spread. From 2000 onwards, we have seen many Trojans, viruses, and worms released, impacting various systems. The state of affairs is continuing even today with many new viruses and Trojans being released by people with malicious intentions. Luckily, to a significant extent, we are protected because of the emergence of strong Anti-Virus software.

The need for Anti-Virus Software has increased, because most of the users of the system are unaware of the specific risks of transacting over the internet. We can see the effect of not having an Anti-Virus Software by purchasing a new desktop / laptop and being connected to the internet for some days and carrying out all kinds of transactions. Possibly, we could unauthorized entries in our banking account, we could see our credit cards being misused to make unauthorized purchases, and we may receive complaints lodged against us that our system is initiating attacks on others.

This method of coding a plain text message into a secret coded message is called cryptography. The method of disguising plain text to hide the actual data is called encryption. The new encrypted text is called ciphertext. The encrypted data is not readable by others and hence it is secur.

Encryption and decryption are done using a “key" or “code”. Sometimes, only one key is used to perform both encryption and decryption; sometimes two separate keys are used, one for encryption and the other key for decryption. In today’s Internet world, cryptography applications are used to enable digital signatures, money transfers, online shopping, online booking, and credit card payments, where authentication and privacy are crucial. Cryptography makes transactions on the web more secure through digital certificates, 3-D secure, and other encryption technology. Cryptography, cryptanalysis, and cryptology are interrelated. In general cryptography refers to the technique of encrypting and decrypting plain text. Cryptanalysis refers to analyzing and breaking the keys used for encryption and decryption (generally used by hackers). Cryptology refers to both: study of cryptography and cryptanalysis.

Definition Survey

a. Primary Terms
Asset
is any information, data or computing resource that has an estimated value.
Value
is called the importance of an object, expressed financially or otherwise.
Owner
of a good is the natural or legal person who owns or is responsible for a part or all of that good and who has the right to determine how the good will be used or modified.
System Owner
is called the owner of some computing resources, also is called an entity that utilizes part or all of an Information System.
Information Owner
is called the owner of a good which is in the form of information.
Authorisation
is the process by which the owner of a good grants some kind of right to a person or process.
User
is called an entity that utilizes part or all of an Information System.

Not only these but many more . . . [infosec team]

b. IoT Survey
Can we define Internet of Things ?
It is a dynamic system of smart devices (objects) that can sense and store data, analyze the information, communicate through a (communication) channel and provide smart services. While the Internet of Things is still seeking its own shape, its effects have already stared in making incredible strides as a universal solution media for the connected scenario.
IoT system
is comprised of a number of functional blocks to facilitate various utilities to the system such as, sensing, identification, actuation, communication, and management (Sebastian and Ray, 2015a).
Device in IoT
An IoT system is based on devices that provide sensing, actuation, control, and monitoring activities. IoT devices can exchange data with other connected devices and application, or collect data from other devices and process the data either locally or send the data to centralized servers or cloud based applications back-ends for processing the data, or perform some tasks locally and other tasks within IoT infrastructure based on temporal and space con- straints (i.e. memory, processing capabilities, communication latencies, and speeds, and deadlines). An IoT device may consist of several interfaces for communications to other devices, both wired and wireless. These include:
(i) I/O interfaces for sensors,
(ii) interfaces for Internet connectivity,
(iii) memory and storage interfaces, and
(iv) audio/ video interfaces.
IoT devices can also be of varied types, for instance, wearable sensors, smart watches, LED lights, automobiles and industrial machines.
Communication
The communication block performs the communication between devices and remote servers. IoT communication protocols generally work in data link layer, network layer, transport layer, and application layer.
Services
An IoT system serves various types of functions such as services for device modeling, device control, data publishing, data analytics, and device discovery.
Management
Management block provides different functions to govern an IoT system to seek the underlying governance of IoT system.
Security
Security functional block secures the IoT system by providing functions such as, authentication, authorization, privacy, message integrity, content integrity, and data security.
Application
Application layer is the most important in terms of users as it acts as an interface that provides necessary modules to control, and monitor various aspects of the IoT system. Applications allow users to visualize, and analyze the system status at present stage of action, sometimes prediction of futuristic prospects.

Not only these but many more . . .

[Available 8 October 2016 from "Department of Computer Applications, Sikkim University"]

c. General Data Protection Regulation - GDPR
GDPR
Here you can find the official PDF of the Regulation (EU) 2016/679 (General Data Protection Regulation) in the current version. All Articles of the GDPR are linked with suitable recitals. The European Data Protection Regulation is applicable as of May 25th, 2018 in all member states to harmonize data privacy laws across Europe.
e-nomothesia
Νόμος 4624/2019 - ΦΕΚ 137/Α/29-8-2019 and more to read . . .

ΓΕΝΙΚΟ ΕΠΙΤΕΛΕΙΟ ΣΤΡΑΤΟΥ

Μπορείς να ρίξεις και εδώ μια ματιά . . .

sample-image

Το Γενικό Επιτελείο Στρατού είναι το ανώτατο ιεραρχικά κλιμάκιο του Στρατού Ξηράς και το όργανο εκείνο, το οποίο βοηθά τον Υπουργό Εθνικής Άμυνας στην ενάσκηση των καθηκόντων του και στην υλοποίηση της πολιτικής εθνικής άμυνας που χαράζει η Κυβέρνηση. Ο θεσμός του Επιτελείου είναι πολύ παλιός. Δημιουργήθηκε στην αρχαία Ελλάδα, όταν αυξήθηκαν και οργανώθηκαν οι στρατιωτικές δυνάμεις, ιδιαίτερα στην εποχή του Φιλίππου και του Μεγάλου Αλεξάνδρου. Η ιδέα συγκρό . . .τησης τακτικού στρατού στη Νεότερη Ελλάδα γεννήθηκε για πρώτη φορά στις αρχές της Ελληνικής Επανάστασης του 1821. Μέχρι τότε κανένα οργανωμένο στρατιωτικό τμήμα δεν υπήρχε. Ο αγώνας για την εθνική ανεξαρτησία γινόταν από άτακτα σώματα, αποτελούμενα κυρίως από ομάδες κλεφτών και αρματολών με επικεφαλής εμπειροπόλεμους οπλαρχηγούς (Καπιτάνους). Πρώτος ο Αλέξανδρος Υψηλάντης, το Μάρτιο του 1821, συγκρότησε στο Ιάσιο της Μολδαβίας το γνωστό Ιερό Λόχο από ένα τάγμα Πεζικού (500 άντρες), 200 ιππείς και μία πυροβολαρχία (4 πυροβόλα). Ένα χρόνο αργότερα, τον Απρίλιο του 1822, θεσπίστηκε με νόμο η σύσταση τακτικού στρατού. Το 1833 συστάθηκε Σώμα Γενικών Επιτελών, με αποστολή του τη διεξαγωγή της Επιτελικής Υπηρεσίας του Στρατού. Το 1877 συγκροτήθηκε για πρώτη φορά το Γενικό Επιτελείο Στρατού, το οποίο αποτέλεσε την πρώτη οργανωμένη επιτελική υπηρεσία του Υπουργείου Στρατιωτικών. Τρία χρόνια, όμως, αργότερα και πριν ακόμη αυτό οργανωθεί πλήρως και λειτουργήσει κανονικά, καταργήθηκε. Στη θέση του συστάθηκε το Γραφείο Επιτελικής Υπηρεσίας του Υπουργείου Στρατιωτικών. Συγχρόνως, με την κατάργηση του Γενικού Επιτελείου Στρατού, καταργήθηκε και το Σώμα Γενικών Επιτελών. Το 1904 το Επιτελείο της Γενικής Διοίκησης Στρατού, που είχε συσταθεί για πρώτη φορά το 1900, αναδιοργανώθηκε σε «Γενικό Επιτελείο της Γενικής Διοίκησης Στρατού» με σημαντικά αυξημένες αρμοδιότητες, ενώ η Διεύθυνση Επιτελικής Υπηρεσίας του Υπουργείου Στρατιωτικών περιορίστηκε σε «Τμήμα» αρμόδιο να εισηγείται στο Υπουργείο τις προτάσεις της Γενικής Διοίκησης Στρατού. Συγχρόνως ανασυστάθηκε και το Σώμα Γενικών Επιτελών, με αποστολή τη διεξαγωγή της επιτελικής Υπηρεσίας του Στρατού. Έγινε ένα σοβαρότατο οργανωτικό άλμα, που άρχισε το 1900 και ολοκληρώθηκε το 1904, γιατί για πρώτη φορά θεσπίστηκε στο Στρατό πλήρως οργανωμένο επιτελικό όργανο, αρμόδιο για την οργάνωση των πολεμικών δυνάμεων, την προπαρασκευή της επιστράτευσης, την αμυντική ενίσχυση της χώρας και όλα τα άλλα συναφή θέματα . . .


Online Converter


    Input in :

    Binary  Octal  Decimal  Hexa-decimal 

    Output in :

    Binary  Octal  Decimal  Hexa-decimal 

  • "O καθένας μπορεί να θυμώσει -αυτό είναι εύκολο. Αλλά το να θυμώσει κανείς με το σωστό άτομο, στο σωστό βαθμό και στη σωστή στιγμή, για τη σωστή αιτία και με το σωστό τρόπο -αυτό δεν είναι εύκολο"

    Αριστοτέλη (384 π.χ. - 322 π.χ) - Ηθικά Νικομάχεια
  • Methodolatry is "... the idolatry of method, or a slavish attachment and devotion to method, that so often overtakes the discourse in the education and human services fields"

    Janesick (2000)
  • "Τους Λαιστρυγόνες και τους Κύκλωπας, τον άγριο Ποσειδώνα δεν θα συναντήσεις, αν δεν τους κουβανείς μες στην ψυχή σου, Αν η ψυχή σου δεν τους στήνει εμπρός σου"

    Κωνσταντίνος Καβάφης (1868 - 1933) - " από την «Ιθάκη» "
  • "Εάν αποσυνθέσεις την Ελλάδα, στο τέλος θα δεις να σου απομένουν μια ελιά, ένα αμπέλι κι ένα καράβι. Που σημαίνει: με άλλα τόσα την ξαναφτιάχνεις"

    Οδυσσέας Ελύτης (1911 - 1996) - Νόμπελ 1979