1 of 18

Course

Activism in cyberspace as a hybrid threats counter

Academic year 2023-2024

Jean Monnet Module Erasmus+

“Civil society in conflict resolution process:

the EU experience for Ukraine”

101084973 — EURoCoRP — ERASMUS-JMO-2022-HEI-TCH-RSCH

2 of 18

ACTIVISM IN CYBERSPACE AS A HYBRID THREATS COUNTER

Course Content (1)

Topic: 1: Hybrid threats in social networks: the realities of the XXI century.

Topic 2: Classification of social networks.

Topic 3: Mechanisms of inciting conflicts in social networks.

Topic 4: Types of information influences.

Topic 5: Infodemia and Information Chaos.

Topic 6: Public practice of counteracting misinformation and propaganda.

Topic 7: Media literacy.

Topic 8: Development of Soft skills to counter misinformation and propaganda.

Topic 9: European information policy.

Topic 10: Information policy of Ukraine.

3 of 18

3

Topic 11: Regulatory regulation of information security.

Topic 12: Anti-disinformation policy: EU practice, implementation in Ukraine.

Topic 13: EU Disinformation Organization.

Topic 14: Information warfare and operations of influence.

Topic 15: Cyberwarfare - threat awareness and counteraction.

Topic 16: Attacking information weapon.

Topic 17: New technologies in mitigating and countering hybrid threats.

Topic 18: Information security and cybersecurity.

Topic 19: Regulatory and Legal Enforcement of Cyber Security in Countries of the European Union: The Experience for Ukraine.

Topic 20: The vulnerability of cyberspace: Ukraine.

ACTIVISM IN CYBERSPACE AS A HYBRID THREATS COUNTER

Course Content (2)

4 of 18

Topic 17: New technologies in mitigating and countering hybrid threats

  • Role of AI in Hybrid Threat Mitigation
  • AI Applications in Cyber Defense
  • AI and AI Blockchain for Social Media Analysis
  • Research and Study of New Breakthrough Technologies
  • Integration and Future Outlook

5 of 18

Topic 17: New technologies in mitigating and countering hybrid threats

Brainstorming questions

How do you define a hybrid threat in today's context, and why is it more challenging to counter than traditional threats?

In what ways do you believe technology has both contributed to and helped mitigate hybrid threats?

6 of 18

Role of AI in Hybrid Threat Mitigation

Artificial Intelligence (AI), a term coined by emeritus Stanford Professor John McCarthy in 1955, was defined by him as “the science and engineering of making intelligent machines”. Much research has humans program machines to behave in a clever way, like playing chess, but, today, we emphasize machines that can learn, at least somewhat like human beings do.�

7 of 18

Role of AI in Hybrid Threat Mitigation

  • Enhancement of Detection and Response
  • Pattern Recognition
  • Anomaly Detection
  • Predictive Analytics�

8 of 18

AI Applications in Cyber Defense

What is AI in Cybersecurity?

AI in Cybersecurity refers to the use of Al & machine learning algorithms and techniques to enhance the security of computer systems & networks. The goal of cybersecurity is to automate the process of detecting, preventing and mitigating security threats, thereby making cybersecurity more efficient.

9 of 18

AI Applications in Cyber Defense

  • Threat Detection
  • Intrusion Prevention
  • Malware Detection
  • Fraud Detection

10 of 18

AI Applications in Cyber Defense

Defensive Artificial Intelligence (AI)

Cybersecurity professionals can use defensive artificial intelligence (AI) to detect or stop cyberattacks. Savvy cybercriminals use technologies like offensive AI and adversarial machine learning because they are more difficult for traditional cybersecurity tools to detect.

11 of 18

AI Applications in Cyber Defense

Extended Detection and Response (XDR)

Extended detection and response (XDR) is a type of advanced cybersecurity technology that detects and responds to security threats and incidents. XDR responds across endpoints, the cloud, and networks. It evolved from the simpler traditional endpoint detection and response.

Benefits of XDR include automation of repetitive tasks, strong automated detection, and reducing the number of incidents that need investigation.

12 of 18

AI for Social Media Analysis

  • Automated Fact-Checking for Disinformation Detection
  • Detection of Disinformation through Language Analysis
  • Detection of Disinformation through Sentiment Analysis
  • Using Human-in-the-Loop AI Systems for Detecting Disinformation
  • The Application of AI Blockchain in the Automated Detection of Disinformation

13 of 18

Al for Social Media Analysis

14 of 18

Research and Study of New Breakthrough Technologies

Blockchain

Blockchain is a type of database that securely stores data in blocks. It connects the blocks through cryptography. Blockchain allows information to be collected, but not edited or deleted.

Benefits of blockchain include better user privacy, reduction of human error, greater transparency, and cost savings by removing the need for third-party verification.

15 of 18

Research and Study of New Breakthrough Technologies

Cloud Encryption

Cloud services improve efficiency, help organizations offer improved remote services, and save money. However, storing data remotely in the cloud can increase data vulnerabilities. Cloud encryption technology changes data from understandable information into an unreadable code before it goes into the cloud.

16 of 18

Sources

  1. ALJAZEERA. Fake Pentagon explosion photo goes viral: How to spot an AI image.
  2. Brookings. Artificial Intelligence and Emerging Technology Initiative
  3. Fatima C. Carrilho Santos. Artificial Intelligence in Automated Detection of Disinformation: A Thematic Analysis.
  4. Frank Cremer, Barry Sheehan, corresponding author Michael Fortmann, Arash N. Kia, Martin Mullins, Finbarr Murphy, and Stefan Materne. Cyber risk and cybersecurity: a systematic review of data availability
  5. Kristian Bischoff. AI tools in hybrid warfare - A double-edged sword
  6. Liz Simmons. New Technologies in Cybersecurity
  7. Stanford University. AI-Definitions-HAI
  8. Tom Cassauwers. Can artificial intelligence help end fake news?
  9. Valentina Dragos, Bruce Forrester, Kelyn Rein. Is hybrid AI suited for hybrid threats? Insights from social media analysis

17 of 18

17

Jean Monnet Actions

Useful links

EURoCoRP

Ostroh Academy, NU

European Commission

18 of 18

Thank you for attention!

Prof. in charge – Dmytro Shevchuk, Doc. Sci.

Co-Lecturer - Sergii Ishchuk, Doc. Sci.

Co-Lecturer - Tetiana Sydoruk, Doc. Sci.

Co-Lecturer - Kateryna Yakunina, PhD

Co-Lecturer - Olena Shershnova, PhD

The National University of Ostroh Academy

https://www.oa.edu.ua/

https://eurocorp.oa.edu.ua/