Repository logo
  • English
  • ქართული
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • English
  • ქართული
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Universities
  3. Tbilisi Open University
  4. ჰუმანიტარულ და სოციალურ მეცნიერებათა სკოლა (სამაგისტრო ნაშრომები)
  5. კიბეროპერაციები
 
  • Details
Options

კიბეროპერაციები

Date Issued
2021
Author(s)
გალუმოვი, კახა  
Institution
თბილისის ღია სასწავლო უნივერსიტეტი  
Faculty
ჰუმანიტარულ და სოციალურ მეცნიერებათა სკოლა  
URI
https://openscience.ge/handle/1/2925
Abstract
The master's thesis - "Cyber Operations" - consists of an introduction, seven chapters, a conclusion and an appendix.
The first chapter - "A Brief Description of Destructive State Cyberactors" - discusses the examples of several countries and for what purposes the cyberspace is used by countries such as Russia, Iran, North Korea. You will also learn about the cyber operations that Russia is actively using in relation to various countries, including Georgia. You will find information about the National Center for Defense Management (NDMC), which is the highest body of the Russian Ministry of Defense, Armed Forces and Control.
The second chapter - "Threats to Georgian Cyberspace" - discusses the current threats and challenges for Georgia. Also, using cyberspace, attacks from the Russian side, target audience and cyber measures targeted at them. Nowadays, the world is actively discussing the threat to privacy of information and its access. In this regard, information-technical and information-psychological impacts are discussed.
The third chapter - "Election Security" - describes the ways in which Russia interferes in the elections. Experience of countries targeting their cyber operations. We will also look at the information operations techniques, threats, actors, and risk management practices and advice that are frequently used in electoral processes.
In the fourth chapter - "Cyberterrorism" - you will learn what cyberterrorism is and what it entails. The possession of cyberspace for terrorist groups, their action plans and actions to achieve various, desired goals are discussed. Terrorist organizations such as ISIS, Hizballa, Hamas, Al Qaeda, Taliban are also discussed.
The fifth chapter - "Cyberpsychology" - discusses the use of cyberspace in operations with psychological effects. Additionally, Russian cyberpsychology towards Poland, Principles of operation of the Russian media and other media and the attacks carried out by them, attempts at Russian cyberpsychology and attacks in Georgia are also discussed. This topic presents ways used by Russia to manipulate information. You will learn about the activities of Internet trolls and Internet bots from a psychological point of view.
The sixth chapter - "The use of cyberspace in modern conflicts" - discusses what is the concept of the use of cyberspace in various conflicts, discusses the cyber attacks used during conflicts, their scope and preventive measures. Cyber War. The purpose of cyber conflicts, cyber war in Ukraine, measures to destroy destructive information and cyber influence. You will learn about the three main areas of state sovereignty in cyberspace, as well as the experience of military conflicts.
Chapter 7 - "NATO - Cyber Security" - discusses various articles in case of cyber attacks, the challenge of cyber operations and the threats to NATO. Article 5 of the North Atlantic Treaty, its use in the event of a cyber attack, how to justify a military response to an Article 5 cyber attack. Stages in the development of NATO cyberspace issues. Cyberspace and Military Conflicts: Doctrinal Approaches to Terminology. The main challenges of the current NATO strategy.
The main goal of the thesis is to create an idea of the expected threats and risks and to develop recommendations for their management.
Subjects

კიბერტერორიზმი

საქართველოს კიბერსივრ...

არჩევნების უსაფრთხოებ...

Degree Name
უსაფრთხოების კვლევების მაგისტრი
Degree Discipline
ეროვნული და საერთაშორისო უსაფრთხოება
File(s)
Loading...
Thumbnail Image
Name

Kaha Galumovi Samagistro.pdf

Description
კიბეროპერაციები
Size

682.68 KB

Format

Adobe PDF

Checksum

(MD5):c159ab279ce3bf48283c22c9fc461fc5

Communities & Collections Research Outputs Fundings & Projects People
  • Cookie settings
  • Privacy policy
  • Contact