Course
“Activism in cyberspace as a hybrid threats counter”
Academic year 2023-2024
Jean Monnet Module Erasmus+
“Civil society in conflict resolution process:
the EU experience for Ukraine”
101084973 — EURoCoRP — ERASMUS-JMO-2022-HEI-TCH-RSCH
ACTIVISM IN CYBERSPACE AS A HYBRID THREATS COUNTER
Course Content (1)
Topic: 1: Hybrid threats in social networks: the realities of the XXI century.
Topic 2: Classification of social networks.
Topic 3: Mechanisms of inciting conflicts in social networks.
Topic 4: Types of information influences.
Topic 5: Infodemia and Information Chaos.
Topic 6: Public practice of counteracting misinformation and propaganda.
Topic 7: Media literacy.
Topic 8: Development of Soft skills to counter misinformation and propaganda.
Topic 9: European information policy.
Topic 10: Information policy of Ukraine.
3
Topic 11: Regulatory regulation of information security.
Topic 12: Anti-disinformation policy: EU practice, implementation in Ukraine.
Topic 13: EU Disinformation Organization.
Topic 14: Information warfare and operations of influence.
Topic 15: Cyberwarfare - threat awareness and counteraction.
Topic 16: Attacking information weapon.
Topic 17: New technologies in mitigating and countering hybrid threats.
Topic 18: Information security and cybersecurity.
Topic 19: Regulatory and Legal Enforcement of Cyber Security in Countries of the European Union: The Experience for Ukraine.
Topic 20: The vulnerability of cyberspace: Ukraine.
ACTIVISM IN CYBERSPACE AS A HYBRID THREATS COUNTER
Course Content (2)
Topic 17: New technologies in mitigating and countering hybrid threats
Topic 17: New technologies in mitigating and countering hybrid threats
Brainstorming questions
How do you define a hybrid threat in today's context, and why is it more challenging to counter than traditional threats?
In what ways do you believe technology has both contributed to and helped mitigate hybrid threats?
Role of AI in Hybrid Threat Mitigation
Artificial Intelligence (AI), a term coined by emeritus Stanford Professor John McCarthy in 1955, was defined by him as “the science and engineering of making intelligent machines”. Much research has humans program machines to behave in a clever way, like playing chess, but, today, we emphasize machines that can learn, at least somewhat like human beings do.�
Role of AI in Hybrid Threat Mitigation
AI Applications in Cyber Defense
What is AI in Cybersecurity?
AI in Cybersecurity refers to the use of Al & machine learning algorithms and techniques to enhance the security of computer systems & networks. The goal of cybersecurity is to automate the process of detecting, preventing and mitigating security threats, thereby making cybersecurity more efficient.
AI Applications in Cyber Defense
AI Applications in Cyber Defense
Defensive Artificial Intelligence (AI)
Cybersecurity professionals can use defensive artificial intelligence (AI) to detect or stop cyberattacks. Savvy cybercriminals use technologies like offensive AI and adversarial machine learning because they are more difficult for traditional cybersecurity tools to detect.
AI Applications in Cyber Defense
Extended Detection and Response (XDR)
Extended detection and response (XDR) is a type of advanced cybersecurity technology that detects and responds to security threats and incidents. XDR responds across endpoints, the cloud, and networks. It evolved from the simpler traditional endpoint detection and response.
Benefits of XDR include automation of repetitive tasks, strong automated detection, and reducing the number of incidents that need investigation.
AI for Social Media Analysis
Al for Social Media Analysis
Research and Study of New Breakthrough Technologies
Blockchain
Blockchain is a type of database that securely stores data in blocks. It connects the blocks through cryptography. Blockchain allows information to be collected, but not edited or deleted.
Benefits of blockchain include better user privacy, reduction of human error, greater transparency, and cost savings by removing the need for third-party verification.
Research and Study of New Breakthrough Technologies
Cloud Encryption
Cloud services improve efficiency, help organizations offer improved remote services, and save money. However, storing data remotely in the cloud can increase data vulnerabilities. Cloud encryption technology changes data from understandable information into an unreadable code before it goes into the cloud.
Sources
17
Jean Monnet Actions
Useful links
EURoCoRP
Ostroh Academy, NU
European Commission
�Thank you for attention!
Prof. in charge – Dmytro Shevchuk, Doc. Sci.
Co-Lecturer - Sergii Ishchuk, Doc. Sci.
Co-Lecturer - Tetiana Sydoruk, Doc. Sci.
Co-Lecturer - Kateryna Yakunina, PhD
Co-Lecturer - Olena Shershnova, PhD
The National University of Ostroh Academy