I am military officer at Hellenic Army; Cisco CCNA certified; and Ph.D. student. My current research interests include Cyber Ranges (CRs) platforms, and searching for educational models and methods for computer network management and security (CNMS).
[...] Cybersecurity is a continuous process of protecting general critical infrastructures (GCIs), information technology networks (ITNs), and cyber-physical systems (CPSs) from attack, damage, or unauthorized access. Ensuring a safe work environment is instrumental and one of the global challenges against cyber threats and crimes. To meet this mission-critical need, an educational and experimental platform is required for cybersecurity exploration and participants’ skills improvement. Adopting CRs platforms for education in the cyber domain has emerged as a promising solution.
Cyber-attacks against infrastructures, systems, and networks occur daily, many of these on a large scale and at an alarming rate. Gartner's report predicts that by 2024 at least 50% of organizations will use AI-driven security programs to detect cyberattacks. The advent of smart computers and networks with extensive communication capabilities yields new vulnerabilities due to a high dependency on cyber information. To combat threats and protect enterprises and critical assets such as unified CPSs, [including physical systems, computer systems, industrial control systems, and Internet of Things (IoT)], data, and production services while ensuring a safe environment for work, it is fundamental to implement unique education platforms.
Cyber-knowledge is best learned by practice on hyper-realistic platforms because practicing on production systems is not considered appropriate. As such, CRs platforms have been developed, where participants (i.e., students, professionals, etc.) may prepare, and improve their cybersecurity posture (i.e., basic, intermediate, professional, etc.), and hone their knowledge (i.e., security, analytics, etc.). CRs provide cyber activities that operate like real-world systems, in the context of realistic true-to-life scenarios [...].
Dionysis Stamatopoulos
Athens, Greece
diostam@yahoo.gr
admin@diostam.info
Ph.D. Student - Department of Applied Informatics•since June 2022
Cisco Certified Network Associate• September 2020
Master in Information Systems• July 2019
Information Systems Administrator - Military Academy• December 2012
European Computer Driving Licence• September 2001
Technical Support of Telecomunications Systems• June 1998
ISACA Athens Chapter • June 2022
Cisco Certified Accademy • December 2020
National Centre for Public Administrator and Local Government • july 2019
Greek ICT Forum • February 2018
Greek ICT Forum • October 2017
Imagine a world without the Internet. No more Google, YouTube, instant messaging, Facebook, Wikipedia, online gaming, Netflix, iTunes and easy access to current information. No more price comparison websites, avoiding lines by shopping online, or quickly looking up phone numbers and map directions to various locations at the click of a button. How different would our lives be without all of this? That was the world we lived in just 15 to 20 years ago. But over the years, data networks have slowly expanded and been repurposed to improve the quality of life for people everywhere . . . [Cisco, 2020]
The European Union Agency for Cybersecurity self-designation ENISA from the abbreviation of its original name is an agency of the European Union. It is fully operational since September 1, 2005. The Agency is located in Athens, Greece and has a second office in Heraklion, Greece.
information, CybersecurityThe National Institute of Standards and Technology (NIST) was founded in 1901 and is now part of the U.S. Department of Commerce. NIST is one of the nation's oldest physical science laboratories. Congress established the agency to remove a major challenge to U.S. industrial competitiveness at the time a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany, and other economic rivals.
U.S. Department of Commerce, InfrastructureThe origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war, it was relocated in the army's organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the Navy's cryptanalysis functions in July 1918. World War I ended on November 11, 1918, and the army cryptographic section of Military Intelligence (MI-8) moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.
National Security Agency, CommunicationsCisco Systems, Inc. is an American multinational technology conglomerate headquartered in San Jose, California, in the center of Silicon Valley. Cisco develops, manufactures and sells networking hardware, software, telecommunications equipment and other high-technology services and products. Through its numerous acquired subsidiaries, such as OpenDNS, Webex, Jabber and Jasper, Cisco specializes in specific tech markets, such as the Internet of Things (IoT), domain security and energy management. On January 25, 2021, Cisco reincorporated in Delaware. Cisco stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index.
Networking, Cloud, and Cybersecurity SolutionsAT&T Inc. is an American multinational conglomerate holding company, Delaware registered but it is headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world’s largest telecommunications company, and the second largest provider of mobile telephone services. As of 2020, AT&T was ranked 9th on the Fortune 500 rankings of the largest United States corporations, with revenues of $181 billion.As also is, As one of the world’s largest Managed Security Services Providers (MSSP), AT&T Cybersecurity delivers the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations.
Telecommunications, Security Services Providers (MSSP)The European Organization for Nuclear Research, known as CERN, is a European research organization that operates the largest particle physics laboratory in the world. Established in 1954, the organization is based in a northwest suburb of Geneva on the Franco–Swiss border and has 23 member states. Israel is the only non-European country granted full membership. CERN is an official United Nations Observer.
Laboratory, Infrastructure, Nuclear, ExperimentsThe Cybersecurity and Infrastructure Security Agency (CISA) is a standalone United States federal agency, an operational component under Department of Homeland Security (DHS) oversight. Its activities are a continuation of the National Protection and Programs Directorate (NPPD). CISA was established on November 16, 2018 when President Donald Trump signed into law the Cybersecurity and Infrastructure Security Agency Act of 2018. Former NPPD Under-Secretary Christopher Krebs was CISA's first Director, and former Deputy Under-Secretary Matthew Travis was its first Deputy Director. The expected role of CISA is to improve cybersecurity across all levels of government, coordinate cybersecurity programs with U.S. states, and improve the government's cybersecurity protections against private and nation-state hackers.
Programs, Infrastructure, SecurityADACOM is based in Athens, Nicosia, Belgrade and London and is ISO 9001:2008 and ISO 27001:2013 certified for the quality and security of the provided services and solutions. ADACOM operates two Certified Processing Centers as a member of Symantec Trust Network. ADACOM S.A. has recently become the first Qualified Trust Service Provider (QTSP) in Greece certified against the eIDAS Regulation No 910/2014. ADACOM S.A. successfully audited by the French company LSTI, a Certification Assessment Body accredited by COFAX France.
Consulting, Analytics, Infrastructure, Governance, Risk, Compliance & Assurance
The connected network has become an integral part of our daily lives.
All types of organizations, such as medical, financial, and education institutions, use this network to operate effectively.
They utilize the network by collecting, processing, storing, and sharing vast amounts of digital information.
As more digital information is gathered and shared,
the protection of this information is becoming even more vital to our national security and economic stability.
Cybersecurity is the ongoing effort to protect these networked systems and all of the data from unauthorized use or harm.
On a personal level, you need to safeguard your identity, your data, and your computing devices.
At the corporate level, it is everyone’s responsibility to protect the organization’s reputation, data, and customers.
At the state level, national security, and the safety and well being of the citizens are at stake.
[Cisco, 2020] - [Photo Internet]
Security engineering is about building systems to remain dependable in the face of malice, error, or mischance.
As a discipline, it focuses on the tools, processes, and methods needed to design, implement, and test complete systems, and to adapt existing
systems as their environment evolves. Security engineering requires cross-disciplinary expertise, ranging from cryptography and computer security
through hardware tamper-resistance and formal methods to a knowledge of applied psychology, organizational and audit methods and the law.
System engineering skills, from business process analysis through software engineering
to evaluation and testing, are also important; but they are not sufficient, as they deal only with error and mischance rather than malice.
Many security systems have critical assurance requirements.
Their failure may endanger human life and the environment (as with nuclear safety and control systems), do serious damage to major economic infrastructure (cash machines and other bank systems),
endanger personal privacy (medical record systems), undermine the viability of whole business sectors (pay-TV), and facilitate crime (burglar and car alarms).
Even the perception that a system is more vulnerable than it really is (as with paying with a credit card over the Internet) can significantly hold up economic development.
The conventional view is that while software engineering is about ensuring that certain things happen (“John can read this file”), security is about ensuring that they don’t
(“The Chinese government can’t read this file”). Reality is much more complex. Security requirements differ greatly from one system to another.
One typically needs some combination of user authentication, transaction integrity and accountability, fault tolerance, message secrecy, and covertness.
But many systems fail because their designers protect the wrong things, or protect the right things but in the wrong way.
[Ross Anderson Cambridge, January 2001] - [Photo Internet]
Social engineering is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information.
Social engineers often rely on people’s willingness to be helpful but also prey on people’s weaknesses.
For example, an attacker could call an authorized employee with an urgent problem that requires immediate network access.
The attacker could appeal to the employee’s vanity, invoke authority using name dropping techniques, or appeal to the employee’s greed.
[Cisco, 2020] - [Photo by new.psu.edu]
Security vulnerabilities are any kind of software or hardware defect. After gaining knowledge of a vulnerability, malicious users attempt to exploit it.
An exploit is the term used to describe a program written to take advantage of a known vulnerability.
The act of using an exploit against a vulnerability is referred to as an attack.
The goal of the attack is to gain access to a system, the data it hosts or to a specific resource.
[Cisco, 2020] - [Photo Internet]
OWASP Top 10 is one of the organization's best-known projects.
OWASP Top 10 is a ranking of the ten most dangerous information security risks for web applications,
compiled by a community of industry experts. For each point of the rating, the risk is calculated by experts based on the OWASP Risk Rating Methodology
and includes an assessment of Weakness Prevalence, Weakness Detectability and Exploitability,
as well as the criticality of the consequences of their operation or Technical Impacts.
[Photo by owasp]
A network connects two or more computers to communicate with each other or for the exchange of information among the systems. Networking is sharing of the resources within a network.
In basic communication, there are three components involved: the sender, the receiver, and the media. In the case of two people communicating with each other face to face, within a short distance,
the media could be just air. Communication is completed only when the sender and receiver understand each other and are able to comprehend the information.
In order to comprehend the information that is being exchanged between the sender and the receiver, the communication "protocol" could be common "language".
Protocol is a set of rules defined by the communication channel in order to comprehend the information that is being exchanged and in normal human communication, it is a common language
understood by both the parties. Let’s say that the sender understands a different language and the receiver understands a different language. For discussion’s sake,
let’s say the sender understands French and the receiver understands Greek. Assume
that both have to exchange information, the media is Facsimile (FAX) in France and Telegraph in Greece. This communication has increased the complexity as both sender and receiver
do not have a common language and there is no common media. The communication needs translators who understand both the languages or two translators – one who understands the sender’s
language (e.g., French) and another common language (e.g., English), another who understands a common language (e.g., English) and the receiver’s language (e.g., Greek).
These translators translate to the senders and receivers. A media translator transfers facsimile information on to the telegraphic information and vice versa.
[Apress open, The infosec Handbook] - [Photo Internet]
With the advancement in computing, networking, and technology, the world is becoming more and more connected. Internet connects millions of computers and most of the geographies of this world.
The Internet is a network of networks and consists of billions of users across private, public, university, and government networks sharing information across the networks.
The Internet uses TCP/IP protocol and the underlying physical media can be
wire, optical, or wireless technologies. The Internet serves an extensive range of applications, starting with e-mail,
the World Wide Web (www), and social networks. Each application may use one or more protocols. There is a large amount of personal, commercial, business, government,
and military information being shared on the Internet.
There are billions of users, both good and bad, accessing the Internet. The bad guys, known as hackers and such other persons with malicious intent are a concern.
With so many computers, networking devices, protocols, and applications on the network, it has become a serious threat to information security. Any application, network device,
or protocol can be vulnerable.
The internet is crawling with people from all over the world who are continuously trying to test the security of various systems and networks. Some are simply testing for fun and others are fuelled
by treacherous motives of stealing or revenge.
A threat is an event that can occur by taking advantage of any vulnerabilities that exist in the network.
Any discussion on network security will include these three common terms:
• Vulnerability: An inherent weakness in the network, and network device. It could be hardware or software or both. Possible vulnerabilities could include routers, switches, servers,
and security devices themselves.
• Threat: A threat is what can go wrong because of the exploit of the vulnerabilities or attack on the assets, such as data theft or unauthorized modification of the data.
• Attack: An attack is an unauthorized action with the intent to cause damage, or hinder or breach security of a network. An attack is launched by intruders to damage the network
and network resources such as end-point devices, servers, or desktops which are vulnerable.
[Photo by alpinesecurity]
The TCP/IP protocol model for internetwork communications was created in the early 1970s and is sometimes referred to as the Internet model.
As shown in the figure, it defines four categories of functions that must occur for communications to be successful. The architecture of the TCP/IP protocol suite follows the structure of this model.
Because of this, the Internet model is commonly referred to as the TCP/IP model.
Most protocol models describe a vendor-specific protocol stack. Legacy protocol suites, such as Novell Netware and AppleTalk, are examples of vendor-specific protocol stacks.
Because the TCP/IP model is an open standard, one company does not control the definition of the model. The definitions of the standard and the TCP/IP protocols are discussed in a
public forum and defined in a publicly available set of RFCs.
[Cisco]- [Photo Internet]
The OSI model provides an extensive list of functions and services that can occur at each layer. It also describes the interaction of each layer with the layers directly above and below.
The TCP/IP protocols discussed in this course are structured around both the OSI and TCP/IP models.
The functionality of each layer and the relationship between layers will become more evident throughout this course as the protocols are discussed in more detail.
[Cisco] - [Photo Internet]
Virtual networking enables communication between multiple computers, virtual machines (VMs), virtual servers, or other devices across different office and data center locations.
While physical networking connects computers through cabling and other hardware, virtual networking extends these capabilities by using software management to connect computers
and servers over the Internet. It uses virtualized versions of traditional network tools, like switches and network adapters, allowing for more efficient routing and easier network
configuration changes.
Virtual networking enables devices across many locations to function with the same capabilities as a traditional physical network. This allows for data centers to stretch across different physical
locations, and gives network administrators new and more efficient options, like the ability to easily modify the network as needs change, without having to switch out or buy more hardware;
greater flexibility in provisioning the network to specific needs and applications; and the capacity to move workloads across the network infrastructure without compromising service, security,
and availability.
[vmware]
Network automation is the process of automating the configuring, managing, testing, deploying, and operating of physical and virtual devices within a network.
With everyday network tasks and functions automated and repetitive processes controlled and managed automatically, network service availability improves.
Any type of network can use network automation. Hardware- and software-based solutions enable data centers, service providers, and enterprises to implement
network automation to improve efficiency, reduce human error, and lower operating expenses.
[Cisco]
I believe that building systems that continue to perform robustly in the face of malice is one of the most important, interesting, and difficult tasks facing engineers in the twenty-first century.
Ross Anderson
It is relatively easy to build an encryption system that is secure if it is working as intended and is used correctly it is still very hard to build a system that does not compromise its security in situations in which it is either misused or one or more of its sub-components fails (or is ‘encouraged’ to misbehave) ... this is now the only area where the closed world is still a long way ahead of the open world and the many failures we see in commercial cryptographic systems provide some evidence for this.
Brian Gladman
The predecessor of the Internet, the Advanced Research Projects Agency Network (ARPANET) was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). Established in 1969, ARPANET served as a testing ground for new networking technologies, linking many universities and research centers. The first two nodes that formed the ARPANET were UCLA and the Stanford Research Institute, followed shortly thereafter by the University of Utah. Some of the reasons for creating ARPANET include making it easier for people to access computers, to improve computer equipment, and to have a more effective communication method for the military. With increasing threats to security, government agencies in charge of ARPANET came up with the Computer Emergency Response Team (CERT): the first network security organization in 1988. The purpose of CERT is to spread security awareness among users and find ways to mitigate security breaches.
Today we are living in the Internet and World Wide Web (WWW) era, where everyone is connected. The Internet has changed the way we communicate with each other. The Web allowed information to be accessed instantly from anywhere in the world. First-generation web 1.0 was just a static web. Web 2.0, called interactive web, allowed the users to communicate by emphasizing online collaboration. Web 3.0 technology called "Semantic Web" emphasized machine-facilitated understanding of information to provide a more intuitive user experience. The Web has become a social medium where we can interact with one another, which has unfortunately resulted in many threats and vulnerabilities and an increasing number of security breaches. Some of the popular attacks include "Mellisa, the love bug", the "killer resume", and "The code red" [Timeline of Computer virus and worms]. The 1990's saw more hacking activities such as the "Michelangelo" virus and the arrest of notorious hacker Kevin Mitnick for stealing credit card data, and the 1998 Solar Sunrise attack targeting Pentagon computers by Ehud Tenebaum.
While a set of scientists work toward securing the network and the information that flows on the network, there is another set of phreaks who challenge the scientists by breaking into the network and the information by cracking the security codes. Hackers are intruders who are as capable and knowledgeable as the scientists, but instead of securing the system, they break into the system, thus undoing all the hard work that the scientists have put in. However, there is a new category of security professionals known as "ethical hackers", who try to help the industry and governments to unearth the security risks. These are the good guys and are known as the "white hats" whereas the bad guys are typically known as the "black hats". The early days of telephone networking witnessed hackers making long-distance calls without actually paying. Hackers used electronic devices to crack into the telephone network to make long-distance calls. The telephone network hackers became popularly known as phreakers. During the same time, the term “cracker” originated as a name for people who crack the system’s security, often by cracking the system’s password.
Without people there is no need for or possibility of any information security. People are the strongest pillars of the information security on the one side. But, they may sometimes tend to be the weakest pillars because of the lack of awareness or bad motives. They are easily prone to social engineering attacks or other malicious attacks. Hence, for strong information security their awareness, vigilance, and positive involvement must be increased and ensured.
Access control provides limits on who can access which resources and what he or she can do with it. The user needs to be identified before he can be given access to the organizational information. Access must first be granted by administrative policies, then the technical controls, and finally, physical access. There are various authentication techniques that organizations can implement and are broadly classified under three layers – administrative, technical, and physical.
Traditionally, passwords were the only form of access control. However, passwords were also easily prone to being guessed or cracked. Strong passwords are one of the absolute requirements in today’s world which is technologically advanced and the technology can crack the passwords in a matter of seconds if they are found to be weak. The passwords can be "static", "dynamic" or a combination of both.
Data encryption protects information from the loss of confidentiality and integrity because it requires a key to decipher the encrypted information and this key is available only with the intended recipient. Encryption provides sufficient security to the information, either stored or transmitted, unless the encryption algorithm is weak, the encryption key is weak, or the encryption key is not well protected. Encryption, if well implemented, can provide access to only the authorized personnel.
Technical controls are usually introduced through or on technological products, tools, or utilities. These again help the organization to either prevent or detect or contain inappropriate and improper access controls. Some of these are passwords, smart cards, encryption, network access controls, and system access controls. Smartcards normally complement password controls. These provide an additional layer of security by adding another layer to gain access. These may be implemented through various technologies like HID, RFID, or Chip-based smart cards. There are various levels of access possible to operating systems as well as to applications. These need to be set up appropriately on a need-to-know and a need-to-do basis. Giving administrative privilege to all users for operating systems can lead to serious infections or violations. Similarly, giving unlimited access to applications should be avoided or it will lead to serious integrity issues.
Physical access controls are again one of the important layers of either preventive or detective controls which supplement or complement other forms of control in mitigating the risk of inappropriate or improper access and modifications to the information. For ease of understanding, let us assume that you are an IT service provider organization and you work for two competing banks. It is necessary that the information pertaining to one bank is not accidentally or intentionally accessed by the personnel who work for the other bank. Physical segregation of the two networks can help ensure high confidence to the customers. Clearly identifying the organizational boundaries and ensuring that the perimeter is secured, restricts improper and inappropriate access to the organizational resources. Some of the important controls of use are electrical fences, microwave barriers, CCTV cameras, and sensor-based intrusion detection systems [IDS].
The word “computer Virus” was coined by Fred Cohen, a student from University of Southern California. The history of computer viruses started in the year 1982, with the virus 'Elk Cloner’. ‘Elk Cloner’ (1982) infected the Apple II Operating System, whereas the next virus, ‘Brain' (1986), which had its root in Pakistan, impacted the boot sector. In 1987, IBM Christmas Worm originated. In 1988, Robert Morris released an Internet Worm which impacted a significant number of computers. In 1998, the spamming of AOL Trojans affected the users of AOL e-mail facility. Melissa hit in 1999 and was the first mass-mailing e-mail virus. Subsequently, ILOVEYOU worm infected systems around the world, in the year 2000. The "Melissa" and "ILOVEYOU" viruses overwrote and deleted files on a huge number of PC's around the world, and used contact lists of users to enable their replication and spread. From 2000 onwards, we have seen many Trojans, viruses, and worms released, impacting various systems. The state of affairs is continuing even today with many new viruses and Trojans being released by people with malicious intentions. Luckily, to a significant extent, we are protected because of the emergence of strong Anti-Virus software.
The need for Anti-Virus Software has increased, because most of the users of the system are unaware of the specific risks of transacting over the internet. We can see the effect of not having an Anti-Virus Software by purchasing a new desktop / laptop and being connected to the internet for some days and carrying out all kinds of transactions. Possibly, we could unauthorized entries in our banking account, we could see our credit cards being misused to make unauthorized purchases, and we may receive complaints lodged against us that our system is initiating attacks on others.
This method of coding a plain text message into a secret coded message is called cryptography. The method of disguising plain text to hide the actual data is called encryption. The new encrypted text is called ciphertext. The encrypted data is not readable by others and hence it is secur.
Encryption and decryption are done using a “key" or “code”. Sometimes, only one key is used to perform both encryption and decryption; sometimes two separate keys are used, one for encryption and the other key for decryption. In today’s Internet world, cryptography applications are used to enable digital signatures, money transfers, online shopping, online booking, and credit card payments, where authentication and privacy are crucial. Cryptography makes transactions on the web more secure through digital certificates, 3-D secure, and other encryption technology. Cryptography, cryptanalysis, and cryptology are interrelated. In general cryptography refers to the technique of encrypting and decrypting plain text. Cryptanalysis refers to analyzing and breaking the keys used for encryption and decryption (generally used by hackers). Cryptology refers to both: study of cryptography and cryptanalysis.
.
is called the owner of some computing resources, also
is called an entity that utilizes part or all of an Information System.Not only these but many more . . . [infosec team]
Not only these but many more . . .
[Available 8 October 2016 from "Department of Computer Applications, Sikkim University"]
.
Μπορείς να ρίξεις και εδώ μια ματιά . . .
Το Γενικό Επιτελείο Στρατού είναι το ανώτατο ιεραρχικά κλιμάκιο του Στρατού Ξηράς και το όργανο εκείνο, το οποίο βοηθά τον Υπουργό Εθνικής Άμυνας στην ενάσκηση των καθηκόντων του και στην υλοποίηση της πολιτικής εθνικής άμυνας που χαράζει η Κυβέρνηση. Ο θεσμός του Επιτελείου είναι πολύ παλιός. Δημιουργήθηκε στην αρχαία Ελλάδα, όταν αυξήθηκαν και οργανώθηκαν οι στρατιωτικές δυνάμεις, ιδιαίτερα στην εποχή του Φιλίππου και του Μεγάλου Αλεξάνδρου. Η ιδέα συγκρό . . .τησης τακτικού στρατού στη Νεότερη Ελλάδα γεννήθηκε για πρώτη φορά στις αρχές της Ελληνικής Επανάστασης του 1821. Μέχρι τότε κανένα οργανωμένο στρατιωτικό τμήμα δεν υπήρχε. Ο αγώνας για την εθνική ανεξαρτησία γινόταν από άτακτα σώματα, αποτελούμενα κυρίως από ομάδες κλεφτών και αρματολών με επικεφαλής εμπειροπόλεμους οπλαρχηγούς (Καπιτάνους). Πρώτος ο Αλέξανδρος Υψηλάντης, το Μάρτιο του 1821, συγκρότησε στο Ιάσιο της Μολδαβίας το γνωστό Ιερό Λόχο από ένα τάγμα Πεζικού (500 άντρες), 200 ιππείς και μία πυροβολαρχία (4 πυροβόλα). Ένα χρόνο αργότερα, τον Απρίλιο του 1822, θεσπίστηκε με νόμο η σύσταση τακτικού στρατού. Το 1833 συστάθηκε Σώμα Γενικών Επιτελών, με αποστολή του τη διεξαγωγή της Επιτελικής Υπηρεσίας του Στρατού. Το 1877 συγκροτήθηκε για πρώτη φορά το Γενικό Επιτελείο Στρατού, το οποίο αποτέλεσε την πρώτη οργανωμένη επιτελική υπηρεσία του Υπουργείου Στρατιωτικών. Τρία χρόνια, όμως, αργότερα και πριν ακόμη αυτό οργανωθεί πλήρως και λειτουργήσει κανονικά, καταργήθηκε. Στη θέση του συστάθηκε το Γραφείο Επιτελικής Υπηρεσίας του Υπουργείου Στρατιωτικών. Συγχρόνως, με την κατάργηση του Γενικού Επιτελείου Στρατού, καταργήθηκε και το Σώμα Γενικών Επιτελών. Το 1904 το Επιτελείο της Γενικής Διοίκησης Στρατού, που είχε συσταθεί για πρώτη φορά το 1900, αναδιοργανώθηκε σε «Γενικό Επιτελείο της Γενικής Διοίκησης Στρατού» με σημαντικά αυξημένες αρμοδιότητες, ενώ η Διεύθυνση Επιτελικής Υπηρεσίας του Υπουργείου Στρατιωτικών περιορίστηκε σε «Τμήμα» αρμόδιο να εισηγείται στο Υπουργείο τις προτάσεις της Γενικής Διοίκησης Στρατού. Συγχρόνως ανασυστάθηκε και το Σώμα Γενικών Επιτελών, με αποστολή τη διεξαγωγή της επιτελικής Υπηρεσίας του Στρατού. Έγινε ένα σοβαρότατο οργανωτικό άλμα, που άρχισε το 1900 και ολοκληρώθηκε το 1904, γιατί για πρώτη φορά θεσπίστηκε στο Στρατό πλήρως οργανωμένο επιτελικό όργανο, αρμόδιο για την οργάνωση των πολεμικών δυνάμεων, την προπαρασκευή της επιστράτευσης, την αμυντική ενίσχυση της χώρας και όλα τα άλλα συναφή θέματα . . .
Input in :
Output in :