Options
კიბეროპერაციები
Date Issued
2021
Author(s)
Institution
Abstract
The master's thesis - "Cyber Operations" - consists of an introduction, seven chapters, a conclusion and an appendix.
The first chapter - "A Brief Description of Destructive State Cyberactors" - discusses the examples of several countries and for what purposes the cyberspace is used by countries such as Russia, Iran, North Korea. You will also learn about the cyber operations that Russia is actively using in relation to various countries, including Georgia. You will find information about the National Center for Defense Management (NDMC), which is the highest body of the Russian Ministry of Defense, Armed Forces and Control.
The second chapter - "Threats to Georgian Cyberspace" - discusses the current threats and challenges for Georgia. Also, using cyberspace, attacks from the Russian side, target audience and cyber measures targeted at them. Nowadays, the world is actively discussing the threat to privacy of information and its access. In this regard, information-technical and information-psychological impacts are discussed.
The third chapter - "Election Security" - describes the ways in which Russia interferes in the elections. Experience of countries targeting their cyber operations. We will also look at the information operations techniques, threats, actors, and risk management practices and advice that are frequently used in electoral processes.
In the fourth chapter - "Cyberterrorism" - you will learn what cyberterrorism is and what it entails. The possession of cyberspace for terrorist groups, their action plans and actions to achieve various, desired goals are discussed. Terrorist organizations such as ISIS, Hizballa, Hamas, Al Qaeda, Taliban are also discussed.
The fifth chapter - "Cyberpsychology" - discusses the use of cyberspace in operations with psychological effects. Additionally, Russian cyberpsychology towards Poland, Principles of operation of the Russian media and other media and the attacks carried out by them, attempts at Russian cyberpsychology and attacks in Georgia are also discussed. This topic presents ways used by Russia to manipulate information. You will learn about the activities of Internet trolls and Internet bots from a psychological point of view.
The sixth chapter - "The use of cyberspace in modern conflicts" - discusses what is the concept of the use of cyberspace in various conflicts, discusses the cyber attacks used during conflicts, their scope and preventive measures. Cyber War. The purpose of cyber conflicts, cyber war in Ukraine, measures to destroy destructive information and cyber influence. You will learn about the three main areas of state sovereignty in cyberspace, as well as the experience of military conflicts.
Chapter 7 - "NATO - Cyber Security" - discusses various articles in case of cyber attacks, the challenge of cyber operations and the threats to NATO. Article 5 of the North Atlantic Treaty, its use in the event of a cyber attack, how to justify a military response to an Article 5 cyber attack. Stages in the development of NATO cyberspace issues. Cyberspace and Military Conflicts: Doctrinal Approaches to Terminology. The main challenges of the current NATO strategy.
The main goal of the thesis is to create an idea of the expected threats and risks and to develop recommendations for their management.
The first chapter - "A Brief Description of Destructive State Cyberactors" - discusses the examples of several countries and for what purposes the cyberspace is used by countries such as Russia, Iran, North Korea. You will also learn about the cyber operations that Russia is actively using in relation to various countries, including Georgia. You will find information about the National Center for Defense Management (NDMC), which is the highest body of the Russian Ministry of Defense, Armed Forces and Control.
The second chapter - "Threats to Georgian Cyberspace" - discusses the current threats and challenges for Georgia. Also, using cyberspace, attacks from the Russian side, target audience and cyber measures targeted at them. Nowadays, the world is actively discussing the threat to privacy of information and its access. In this regard, information-technical and information-psychological impacts are discussed.
The third chapter - "Election Security" - describes the ways in which Russia interferes in the elections. Experience of countries targeting their cyber operations. We will also look at the information operations techniques, threats, actors, and risk management practices and advice that are frequently used in electoral processes.
In the fourth chapter - "Cyberterrorism" - you will learn what cyberterrorism is and what it entails. The possession of cyberspace for terrorist groups, their action plans and actions to achieve various, desired goals are discussed. Terrorist organizations such as ISIS, Hizballa, Hamas, Al Qaeda, Taliban are also discussed.
The fifth chapter - "Cyberpsychology" - discusses the use of cyberspace in operations with psychological effects. Additionally, Russian cyberpsychology towards Poland, Principles of operation of the Russian media and other media and the attacks carried out by them, attempts at Russian cyberpsychology and attacks in Georgia are also discussed. This topic presents ways used by Russia to manipulate information. You will learn about the activities of Internet trolls and Internet bots from a psychological point of view.
The sixth chapter - "The use of cyberspace in modern conflicts" - discusses what is the concept of the use of cyberspace in various conflicts, discusses the cyber attacks used during conflicts, their scope and preventive measures. Cyber War. The purpose of cyber conflicts, cyber war in Ukraine, measures to destroy destructive information and cyber influence. You will learn about the three main areas of state sovereignty in cyberspace, as well as the experience of military conflicts.
Chapter 7 - "NATO - Cyber Security" - discusses various articles in case of cyber attacks, the challenge of cyber operations and the threats to NATO. Article 5 of the North Atlantic Treaty, its use in the event of a cyber attack, how to justify a military response to an Article 5 cyber attack. Stages in the development of NATO cyberspace issues. Cyberspace and Military Conflicts: Doctrinal Approaches to Terminology. The main challenges of the current NATO strategy.
The main goal of the thesis is to create an idea of the expected threats and risks and to develop recommendations for their management.
File(s)
Loading...
Name
Kaha Galumovi Samagistro.pdf
Description
კიბეროპერაციები
Size
682.68 KB
Format
Adobe PDF
Checksum
(MD5):c159ab279ce3bf48283c22c9fc461fc5