Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats

Cyberwarfare as a potential threat to international politics and global security. Familiarity with the challenges facing cybersecurity around the world, consideration of features. Characteristics of the consequences of the Russian-Georgian hybrid war.

Рубрика Политология
Вид статья
Язык английский
Дата добавления 24.05.2022
Размер файла 24,3 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru

Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats

Thornike Zedelashvili, Alika Guchua

Abstract

The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber secu¬rity worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cy¬berspace has already become a weapon of infinite capacity for the whole world. It has generated posi¬tive effect as well as has become the area of evil for terrorists, which are actively using modern tech¬nologies, computer systems. The facts are many and we are often in the center of events. With the de¬velopment of technology in the 21st century, global changes are taking place in international security, the geopolitical transition and new threats and challenges, and international security issues are becom¬ing increasingly important. The international security system is vulnerable to challenges such as the use of weapons of mass destruction and cyber terrorism. The article discusses the dangers and prob¬lems of hybrid warfare in international security, as well as the Russian-Georgian hybrid warfare.

Keywords: Cyberwar, asymmetric threat, hackers, attack, hybrid war, Russia-Georgia, NATO, EU, nuclear terrorism, nuclear security.

Анотація

Кібервійна як феномен асиметричних загроз та загроз кіберядерній безпеці

У статті розглянуто тему кібервійни як явища асиметричної загрози, загрози кіберядерній безпеці в сучасній світовій політиці. Нині кібервійни є потенційною загрозою для процесу між-народної політики та глобальної безпеки. Проаналізовано проблеми, що стоять перед кібербезпекою у всьому світі та стан кібербезпеки. Вони розглядаються на тлі асиметричних загроз, а тому досліджено і антитерористичну політику. Продемонстровано, що кіберпростір вже став зоною безмежних можливостей для зловмисників всього світу. Попри позитивний ефект використання інтернету, існують небезпідставні уявлення про кіберпростір як зону зла для терористів, які активно працюють використовуючи сучасні технології та комп'ютерні системи. З роз-витком технологій у ХХІ столітті, в міжнародних відносинах відбуваються глобальні геополітичні зміни, з'являються нові загрози та виклики міжнародній безпеці, а тому питання асиметричних загроз та загроз кіберядерній безпеці стає дедалі важливішим.

Усі держави вразливі перед такими викликами, як використання зброї масового знищення та кібертероризму. У статті розглядаються небезпеки та проблеми гібридної війни в міжнародній безпеці, а також російсько-грузинська гібридна війна.

Ключові слова: кібервійна, асиметрична загроза, хакери, атака, гібридна війна, Росія-Грузія, НАТО, ЄС, ядерний тероризм, ядерна безпека.

Main players of the cyberspace and 2008 Russia-Georgia cyber war

international security war

In modern times, in the global processes of the world cyberspace plays an important role as a phenomenon of struggle and a new political conflict area. Ensuring international security is most relevant at the level of national se¬curity, on the background of new threats and challenges. One of the key and main issues in global politics is the new dimensions of political conflicts. Cyber-attack, information war, as part of the “hy¬brid war”, are important as to determine the course and the essence of the unfolding of the processes of international security.

Cybernetic space creates many hazardous conditions, not only on the national level, but also on a global scale, cyber-attacks in today's reality accompany all military conflicts that are taking place around us. For example, we can discuss the Russian-Estonian cyber-war in 2007, the cause of which was the initiative of Estonian people and government regarding the transferring the Soviet Memorial Monument of the Second World War elsewhere. The second and quite widespread and diverse war occurred between Russia and Georgia in 2008. During this war, along with military intervention, cyber-attacks took place on the websites of state agencies and news agencies of Russia, which resulted in malfunctioning of almost all state and information web sites. On August 9, all Georgian domains were no longer searchable. When going to the website of the Ministry of Foreign Affairs of Georgia the pictures of President Mikheil Saakashvili and Hitler appeared . This information is also reflected in the report of the Ministry of Foreign Affairs in 2009.

It is noteworthy that Georgian intelligence and counter-intelligence agencies in this direction, along with all other things, were not able to respond and have suffered a complete collapse. When the hacker attacks took place on the web sites, Georgian state agencies tried to create alternate blogs and thus in¬form the population in cybernetic space, but these blogs were actively attacked and blocked.

It is also worth mentioning the Russian-Ukrainian war, where almost every elements of the “hybrid war” has been used, including the most intense cyber and information attacks.

If we look back to the past few years, we can say that together with the change and development of the cybernetic space, the cyber wars have changed and has also developed. The ongoing processes in the world should be taken into consideration, because even the superpower, like the United States, cannot defend itself from cyber-attacks. For example, the US presidential election in 2016 between Hillary Clinton and Donald Trump, where there was a doubt that Russia's involvement in this election was through hacker attacks. While the US investigation has already completed the case study and made an official statement, that Russia did not contribute to Trump's presidency, but it was also said that there was an obvious attempt. If there was an attempt, perhaps Donald Trump will finish his pres-idential career so that he will never get rid of this rumor. In this case, we go back to the topics of the fake news and social networks.

Different social networks are actively used in cybernetic space, which also represents one of the most threatening events. The primary goal and objective of the social network was that one person in the university could easily contact others, boys would have simple contact with girls, but the virtual space went beyond all borders and transformed into a kind of a space for information, advertising, misinformation, psychological terror. One of the most powerful mechanisms of warfare, which has always existed in different ways in world history, is actively used in cybernetic space - the most dan-gerous component - misinformation. Intelligence and counter-intelligence agencies have used this method more intensively both now and in the past. Misinformation in a global scale, as well as in Georgia is a part of daily life that effectively influences the lower class of the population. During the 2018 presidential election, many disinformation spread by political parties on opponents and various issues. One of the misinformation was that such a hacker interference occurred from the Russian side in the elections, which was an absolute absurd. However, on the masses, on people have no access to the computer and were not able to catch up with the technological development, it has worked effec-tively. This misinformation was, of course, coming from the United Opposition forces and, in particu-lar, the “National Movement”. As for the interference of Russia through the hackers in the presidential election, it would not have been possible because elections were not carried out by electronic system. However, Russia's involvement was obvious on the other hand when Vitaly Shliarov's team, a group that was warmly welcomed at Vladimer Putin's door, headed the PR campaign of the presidential can-didate of united opposition, Grigol Vashadze. This is the Vitaly, who helped Ksenia Sobchak's PR campaign as a consultant in last presidential election in Russia. After the election, it became clear that this oppositional move was made by Ksenia Sobchak, was planned by Vladimir Putin.

Questions arise during research: what preconditions proceed the initiation of cyberwar and under what circumstances it originated as one of the terrible species of crime, how the stages passed, and what stage is it on currently? Today humanity does not have the right to take it easy - the more mod¬ern and future technologies develop (and will surely develop), the terrorists will cause the more dan¬ger. Technologies improve? The methods of cyber, terrorist and information warfare also improve. There is an impression that “the fathers of terrorism” achieve such peaks, that are even ahead of tech¬nology development and scientists are forced to follow the so-called Achievements, i.e., invent defen¬sive methods. This is an ordinary war, scientists are studying “achievements” of terrorists and terror¬ists study the achievements of scientists. That is how it was, how it is today and so will be in the fu¬ture, the main thing for humanity is that science should not stay far behind the activities of practicing murderers. While researching this topic, cyber-war as a phenomenon must be divided into several directions: first - technological war or use of techniques; the second is the theory, i.e., the pro-cessing and use of propaganda methods; third - the use of all this in practice, i.e. what is the re¬sult. We should look at any event from the two sides, one is when you fight against terrorism, you car¬ry out real war in the Internet space, and the second is how are you, as a humanity, are attacked , what methods are used by the servants of evil. If you do not look at the event from the other side, if you do not make a diagnosis and do not make a serious analyze, then you will lose any war - technological, theoretical and practical. Here arises a question: What is the situation now, whether humanity loses the fight against evil? Analysis of the past years shows that it is not losing, and neither does it win to zero. Let us look at the series of terrorist attacks in the United States or in Western Europe, even in Afghan-istan, Syria and Iraq, in this respect today's world has lot of troubles. Even if we recall the September 11, 2001, the 19 Islamist terrorist skyjacked four commercial passenger aircrafts. The skyjackers in-tentionally targeted two planes in New York at the two skyscrapers of World Trade Center (so-called twins), resulting in death of all passengers and a large number of the people in those buildings. Both buildings collapsed for two hours, and took along the surrounding two buildings, and many more were damaged. The skyjackers crushed the third plane into the Pentagon building. The fourth plane fell onto the Valley of Somerset-Kent (Pennsylvania). All passengers of the four airplanes were killed. This is a practical war that was preceded by cyber and propagandist wars. Perhaps no one could imagine such results, no one could imagine if such sacrifices would be caused by the evil established in the world, but this fact showed us that if the terrorists had the power, they would start a Third World War with no doubt. Did the super state turn out to be powerless against terrorism? Yes, it turned out to be so. Eve-ryone thought that the most secure and safe country was the United States, it turned out to be a wrong assumption. If anyone thinks that Islamists have just sneaked into the airplane and then crashed onto the ground, is being very mistaken. Of course, this was accompanied with a serious preliminary work in order for the terrorists to fulfill their intentions. The world's leading lawyers have already investi-gated all four cases, all of the four cases (separately) are filmed and all the details are fully restored. In order to cross the barriers of the airports and to get in the airplane with guns, it needs computer pro-cessing at the scientific level. Despite the fact that a long time has passed after the terrorist act, it is the subject of consideration and instructive case for the specialists. Although the red line of terrorism cur-rently goes on the Muslim countries and the fanatic groups are prepared in these countries, specialists still acknowledge that Russia has the most serious experience of conducting propaganda war world-wide.

Cyber element today is an important component of all wars and conflicts. For Georgia as for a per-manent object of the Russian interest, protection of cyberspace should be recognized as a priority di-rection for defending its national security and ensuring defense. Sandro Gotsiridze, expert in cyber security says in his work (“the cyber aspects of the post-Soviet conflicts and Georgia - using cyber elements in modern conflicts”), that it is important to consider the latest trends of using cyber elements in war or crisis situations:

“Cyberspace, as the area of confrontation of parties, gains more value every day. The number of units/divisions involved in the cyber security sphere of developed countries is increasing daily, and the budget is equal to billions of dollars” .

According to Sandro Gotsiridze, a different form of cyber element accompanied the majority of ac-tive combatting confrontations of the last period. The cyber confrontation characterized the Libyan war, partly the Syrian conflict, and cyber espionage and cyber warfare is the constant background of the international relations. The Stuxnet episode, discovery of the spy virus or networks (Duqu, Flame, Gauss, Miniduke, Red October, Wiper) - the cyber espionage or diversions, this incomplete list in-creases day and night from the end of the first decade of the 21st century and gains more significance.

Cyber security policy and hybrid war

When we talk about “hybrid wars”, cyber wars, infor¬mation wars and their constituents, security and discuss this issue from the different points of view, we should highlight and focus on approaches and positions of the North Atlantic Alliance. In the context of security, NATO is the world's most powerful organization, capable of resisting both the technologi¬cal as well as the physical and financial resources to prevent the threats coming from the world. Active work is underway in the North Atlantic Alliance regarding the defensive issues of hybrid wars and it is visible in the ongoing processes. We can say that after the Warsaw Summit in 2016, NATO has under¬taken fundamental reforms and is actively cooperating with partner countries in terms of cyber securi¬ty.

From the example of Georgia, we can say that since 2010 “Caucasus Academy of Security Experts” (CASE) functions, which trains and retrains the military, law enforcement, diplomats, large corpora-tions and students.

Since 2012, the Ministry of Education, Science, Culture and Sport of Georgia has launched the Cyber Security School in Georgia, where anyone can retrain.

In May 2013, the President of Georgia signed the Cyber Security Strategy for 2013-2014, which is the main document that defines the state policy on cyber security.

On February 6, 2014, the LEPL Cyber Security Bureau was established based on the Decree No. 8 of the Minister of Defense of Georgia and its Charter was approved.

“Cyber Security Association” is also functioning in Georgia, which carries out trainings and retrain-ing in cyber security.

From the point of view of our research topic, it is noteworthy to mention new geostrategic tasks of NATO, at present, the military-political organization NATO has activated an appropriate plan, through which joint activities are planned with partner countries and organizations, which, of course, is associ-ated with the improvement of security environment of Georgia.

As for the “hybrid war”, diplomatic, informational, economic and military, these are the basic tools of the “hybrid war”, using which one state carries out hostile actions against another to achieve its own interests. The clearest example of this is Ukraine, where the Russian Federation is trying to keep its influence using all these elements. In modern “hybrid wars”, new elements have been identified - economic, cyber-attacks, nuclear threats, information wars. The most striking example of nuclear threat is the expressions of Russian diplomats against the sovereign choice of Sweden and Finland.

Czech Deputy Foreign Minister Ivan Jestrab said that during the “hybrid war”, the main advantage has the aggressor, because the effect of the unexpectedness is large and the borders are demolished .

In the North Atlantic Alliance, the “hybrid war” is called tactics after the Warsaw Summit it become clear that NATO has made unprecedented steps for the post-cold period, they have chosen the direc-tion towards the adaptation of the Alliance with the new security environment, and NATO is always ready to protect its Member States, from any thrats coming from any direction.

As former NATO advisor on security issues, General Frank Van Kappen notes: “To prevent and overcome international threats, it is necessary for the States to create a united strategic approach in many directions and, of course, to carry out coordinated actions” .

In this regard, the interview of the famous political scientist Soso Tsintsadze is interesting. He told us that the era of the Information War begins with the enhanced methods after the end of the “cold war”, which was baptized as a “hybrid war”:

“With the development of social networks, almost unlimited resources for informational war pro-ducers are created. “Attraction” of the information war consists in the difficulty of defense against it. Hackers are already involved in elections, but it is difficult to prove particular cases. What we see to-day, in our view, is the beginning; the future will be more intense, because already lot of money is spent on this issue.

For example, Russia spends billions in order to gain influence in all areas, especially from political point of view”11.

Asymmetrical threats and jihadist cyber war

In the 2018 report published by the State Security Service of Georgia, more details are presented on what is jihadist cyber war and what kind of danger we may face.

In 2018, for Georgia, as well as for many other countries, the main challenge was the terrorist organ-ization “Islamic State” (“Daesh”) and groups related with it. “Daesh” continued to act with a new strategy developed after weakening and loss of territories. Within the framework of this, it was no longer a priority for “Daesh” to mobilize supporters in Syria and Iraq. The main weapon of the terror-ist organization became carrying out terrorist acts beyond the conflict zone. “Daesh” urged radicalized people residing in different countries around the world to carry out terrorist attacks by any means. The terrorist organization has been actively disseminating its own ideology, using modern technologies, including the Internet and social networks, to radicalize and recruit individuals.

As we read in the report: Al-Qaeda operated mainly through regional groups operating in the Middle East and African continent. The Taliban continued to attack Afghan government forces and the mili-tary of the international mission in Afghanistan.

Professor Vakhtang Maisaia conducted a thorough research of this topic. In his work, it is clear what Islamis State - “Daesh” and “Al-Qaeda” represent:

“These are terrorist organizations that are inspired by the idea of creating a united Islamic Caliphate in the Middle East. However, together with the events in the region, with the use of mass media and global information networks, Islamic extremist and radical ideas and the fulfillment of these ideas have long ago crossed the borders of the combat grounds. This was possible to achieve by the use of a wide range of Internet resources by the terrorists, and with the rapid spread of their ideas via Internet”.

Jihadist networks are created daily in a variety of forms. Here goes, so to say, selective work to bring up new generation jihadists. As Vakhtang Maisaia says, these are the second and third genera¬tion jihadists, who have to work “in the back of the enemy”.

Today more than 10 thousand web sites operate in cyberspace, through which jihadist ideology and practice of terrorism is disseminated. If we add more than 10 thousand web sites to a wide variety of social networks, we will get a very big danger that needs resistance that is more powerful. This cannot be done individually, under the supervision of one country, even if this country is a super-state. In this case, unprecedented cooperation and working on new technologies are needed. One of the main chal-lenges for modern world security is asymmetric threats such as international terrorism and transna-tional organized crime. Weapons, including weapons of mass destruction and its constituents. As well as drug trafficking and trade, human trafficking and cybercrime.

Cyber-nuclear security threats

Nuclear weapons systems were developed before the advancement of computer technology and little consideration was given to potential cyber vulnerabilities. As a re¬sult, current nuclear strategy often overlooks the widespread use of digital technology in nuclear sys¬tems. Nuclear weapons systems are at threat from hostile states, criminal groups and terrorist organisa¬tions exploiting cyber vulnerabities. The likelihood of attempted cyber-attacks on nuclear weapons systems is relatively high and increasing from advanced persistent threats from states and non-state groups. The US could have infiltrated the supply chain of North Korea's missile system that contribut¬ed to a test failure in April last year. The silos of US nuclear-tipped Minuteman intercontinental ballis¬tic missiles “are believed to be particularly vulnerable to cyber attacks”. The group in Belgium affil¬iated to Islamic State monitoring the movements of a nuclear scientist; and German-owned Patriot missiles reported to have been hacked in 2015.

In the context of ongoing geopolitical changes in the modern world, NATO faces new risks and challenges in the world. The new challenges of the Alliance are threats from the eastern and southern flanks, and the current situation has prompted NATO to develop a new military-strategic concept to ensure complete security and ensure the stability of the future alliance. Due to the nuclear threat, the need to change NATO's military strategy is being actively discussed. NATO Secretary General Jens Stoltenberg says NATO will adopt a new strategy. At the same time, he emphasized Russia's occupa-tion of the Crimean peninsula after 2014 and its subsequent annexation. He said the cause was new NATO challenges and the nuclear threat from Russia. According to Stoltenberg ,,This Cold War era military alliance is revitalizing itself - already embroiled in Afghanistan, it's now talking up a fresh start in its relations with Russia as it unveils a new strategic plan to cope with a new range of threats including cyber terrorism” .

It is likely that the new NATO strategy will be based on a policy of non-use and timely containment of Russia's opposition. A nuclear deterrence policy and a Nuclear Planning Committee will be created along with elements that existed during the Cold War. So-called Russia was introduced in 2015. Ac-cording to the Gerasimov doctrine, Russia decided that it would use nuclear weapons first. Given the current situation, NATO must take countermeasures. NATO must balance Russia's countermeasures to deploy strategic offensive weapons and nuclear missile systems, including nuclear warheads. The new strategy covers four main areas: a) strengthening positions in the Black Sea; b) the fight against cyber terrorism and cyber threats; c) increasing the impact on Moscow through sanctions and unifica¬tion; And (d) a package of assistance to allied states. NATO's strategic concepts have been adapted to the threats and challenges facing the Alliance. With all this in mind, it can be argued that NATO's strategic concepts, given the time available, have responded to the threats and challenges that the Alli¬ance faces.

Governments need to address the problems that can be created by cyber capabilities. To avoid this problem first step is develop a better understanding of the threat, including by answering the following questions: Its very interesting what are the feasible targets within the entire contribute chain, the nu-clear weapons system itself and within the reform, modernization and maintenance processes? What kind of vulnerabilities do they have? Moreover who are the potential actors likely to carry through a serious cyber attacks? And which state, non-state actor or state-sponsored group would have an inter-est and the resources and capabilities?

All states which have nuclear weapons, hosting NATO nuclear weapons on their soil, or running a civil nuclear program should conduct annual assessments of the cyber resilience of all systems in question. It is very important to improved information sharing on possible and actual vulnerabilities and lessons learned with the biggest technology companies, vendors and manufacturers, suppliers, be-cause will Introduce international security standards. These companies not keen to release of infor-mation, because their information is not used by hackers and competitors. It's important Government and business work closely together that solve all problems that are related to cyber attacks.

It is also important to consider the dangers and risks associated with nuclear safety. Communications as well as the transfer and storage of data are key targets for cyberattackers. In an earlier United Na¬tions Institute for Disarmament Research (UNIDIR) paper, the International Security Department at Chatham House identified several areas within nuclear weapons systems that could be potentially vul¬nerable to cyberattacks :

* Communications between command and control centres;

* Communications from command stations to missile platforms and missiles;

* Telemetry data from missiles to ground- and space-based command and control assets;

* Analytical centres for gathering and interpreting long-term and real-time intelligence;

* Cyber technologies in transport;

* Cyber technologies in laboratories and assembly facilities;

* Pre-launch targeting information for upload;

* Real-time targeting information from space-based systems including positional, navigational and timing data from global navigational systems;

* Real-time weather information from space-, air-, and ground-based sensors;

* Positioning data for launch platforms (e.g. submarines);

* Real-time targeting information from ground stations;

* Communications between allied command centres; and

* Robotic autonomous systems within the strategic infrastructure .

Subject to exploitation by groups or individuals with malicious intent are these areas. In the analysis, as the attack surface (the number of vulnerabilities in the system or network) increases, and if the se-curity measures are canceled, malicious cyber attacks will increase. For each and every cognitive of nuclear weapons systems, there are various ways, also known as attack vectors, through which the ma-licious actor could access sensitive information and even create phishing information. These attack vectors include the use of remote malware, pre-installed exploits, or access systems before activating human elements.

The interaction between cyber operations and nuclear weapons is a complex problem. The com-plexity and danger of interaction is only partly a function of technology, but also a function of signifi-cant political, economic and strategic differences associated with the use of cyber and nuclear poten-tial. Therefore, international organizations and the participation of states in nuclear safety are important and necessary.

Conclusions

Cyber war, asymmetric threat, use of internet space in terms of terrorism. This is the basic red line and the content of the paper. In addition, it is a subject of research as to what serious problems or threats the civilized world faces. What positive results has the technology development and at the same time, what challenges appear every day? This is the moment when no one should care for themselves only, how are we to be involved in the international defense system, not to become a victim of terrorism, as many countries have become? Today, the only guarantee of stability is the Western course and realizing all the challenges that concerns the modern world. Georgia is on a right way in these terms. However, we still need a lot of work to become a full member of this world.

Preventive measures. Since Georgia is located on the crossroads of Europe-Asia and represents a transit corridor for terrorists or drug traffickers, naturally their interest is present here too. State struc-tures have already recognized that there are groups of persons with extremist opinions in the country, the aims of which are not at this stage, the conflict with the state. It is not excluded that in the future they might use their own connections and financial opportunities in favor of various extremist or ter-rorist groups or organizations. Extremism often changes its form and changes into terrorism, which is associated with the hybrid war, which implies the information and ideological war itself. The only thing that will confront all this is preventive measures taken by the state.

It is imperative that states agree with each other on the proliferation and security of weapons of mass destruction, for example: possible smuggling, cross-border criminal activity, nuclear material, to pre¬vent the illegal transport of radioactive substances and components of weapons of mass destruction. We are on the verge of a completely different global nuclear order, where the problems of nuclear weapon control will change.

Cyber vulnerabilities in nuclear weapons systems and structures pose a range of dangers and risks. At best, cybersecurity in nuclear weapons systems can undermine trust and confidence in military ca-pabilities and nuclear weapons infrastructure. In the worst case, cyber attacks can lead to deliberate misinformation and unintentional launch of nuclear weapons. In times of crisis, the loss of confidence in the potential of nuclear weapons can affect decision-making and can undermine confidence in nu-clear deterrence, especially in expanding nuclear deterrence for allied countries. The challenges that cyber risks pose to nuclear weapons systems can be seen as the possibility of creating an end-to-end risk reduction measure that benefits both traditional proponents and skeptics of nuclear deterrence.

The registration and protection of nuclear materials is a global issue. Putting them in the hands of terrorists and criminals is a big threat to everyone. Governments and decision makers in nuclear- weapon states should also publicly acknowledge that cybersecurity for nuclear weapons systems is a top priority for the security of national military programs. In the modern world, it is difficult to deter-mine the level of threats, so it is important to pay close attention to the protection of nuclear facilities in the world. When it comes to the safety of nuclear weapons, this not only reduces its credibility and deterrent value, but also poses a huge threat to security. Nuclear safety is a very complex issue, so it needs to be studied in more detail.

References

1. Artyukh V. “Fog of the “Hybrid War”: why it is harmful to think hibridally”, Russia, 30 Sep-tember 2016, URL: http://september.media/archives/294.

2. Beyza Unal and Patricia Lewis, “Cybersecurity of Nuclear Weapons Systems Threats, Vulnera-bilities and Consequences”, International Security Department, January 2018. URL: https://www.chathamhouse.org/sites/default/files/publications/research/2018-01-11-cybersecurity- nuclear-weapons-unal-lewis-final.pdf.

3. Cyber Security Association, Tbilisi, 2017, URL: http://scsa.ge.

4. Cyber-attack risk on nuclear weapons systems “relatively high” - thinktank. 11 Jan 2018. URL: https://www.theguardian.com/technology/2018/jan/11/cyber-attack-risk-on-nuclear-weapons-systems- relatively-high-thinktank.

5. Gotsiridze S. “Cyber-attack becomes a method of conventional combat”, Tbilisi, 2010, URL: https://www.radiotavisupleba.ge.

6. Jestrab I. “Hybrid war and its influence on NATO member and partner countries”, Tbilisi, 27 Oct. 2015, URL: http://mod.gov.ge.

7. LEPL “Cyber Security Bureau”, Charter, Tbilisi, 2014, URL: http://csbd.gov.ge.

8. Maisaia V. “Specifics of the informational-propagandist / cyber-virtual war of the “Islamic Ca-liphate” - concepts of the “soft power”, Tbilisi, 7 Jan. 2017, URL: http://geotimes.ge.

9. Markof J. “Before the Gunfire, Cyberattacks”, “The New York Times”, USA, Aug. 12, 2008 year, URL: http://nytimes.com.

10. Ministry of Education, Science, Culture and Sport of Georgia, Tbilisi, 2012, URL: http://mes.gov.ge.

11. Ministry of Internal Affairs of Georgia, “Legislation on cybercrime and general policy”, Tbilisi, 2013, URL: http://police.ge.

12. Nato's Secretary General, Anders Fogh Rasmussen. URL: https://www.bbc.co.uk/

programmes/p00cbjln.

13. Pataraia L. “Caucasus Academy of Security Experts”, Tbilisi, 2010, http://globalcase.org.

14. Tsintsadze S. “Strategy of the informational war and new geostrategic tasks of NATO”, Mas¬ter's Thesis of Tornike Zedelashvili, “Caucasus International University” Tbilisi, 2017.

Размещено на Allbest

...

Подобные документы

  • Review the controversial issues of the relationship between leadership and hegemony in international relations, especially in the context of geostrategy of the informal neo-empires. The formation of a multipolar world order with the "balance of power".

    статья [64,7 K], добавлен 19.09.2017

  • Barack Hussein Obama and Dmitry Medvedev: childhood years and family, work in politics before the presidential election and political views, the election, the campaign and presidency. The role, significance of these presidents of their countries history.

    курсовая работа [62,3 K], добавлен 02.12.2015

  • Сущность антиглобализма, первая организация антиглобалистов People's Global Action. Идеологическая основа и основные тезисы антиглобалистских организаций "Глобальное действие", "Black Bloc", противодействие слиянию всех мировых процессов в единую форму.

    презентация [749,7 K], добавлен 31.01.2013

  • Thrее basic Marxist criteria. Rеlаting tо thе fоrmеr USSR. Nоtеs tо rеstоrе thе socialist prоjеct. Оrigins оf thе Intеrnаtiоnаl Sоciаlists. Thе stаtе cаpitаlist thеоry. Stаtе capitalism аnd thе fаll оf thе burеаucrаcy. Lоcаl prаcticе аnd pеrspеctivеs.

    реферат [84,6 K], добавлен 20.06.2010

  • The definition of democracy as an ideal model of social structure. Definition of common features of modern democracy as a constitutional order and political regime of the system. Characterization of direct, plebiscite and representative democracy species.

    презентация [1,8 M], добавлен 02.05.2014

  • Referendum - a popular vote in any country of the world, which resolved important matters of public life. Usually in a referendum submitted questions, the answers to which are the words "yes" or "no". Especially, forms, procedure of referendums.

    презентация [1,2 M], добавлен 25.11.2014

  • The rivalry between Islam and Chistianity, between Al-Andalus and the Christian kingdoms, between the Christian and Ottoman empires triggered conflicts of interests and ideologies. The cultural explanation of political situations in the Muslim world.

    реферат [52,8 K], добавлен 25.06.2010

  • Analysis of Rousseau's social contract theory and examples of its connection with the real world. Structure of society. Principles of having an efficient governmental system. Theory of separation of powers. The importance of censorship and religion.

    статья [13,1 K], добавлен 30.11.2014

  • Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute

    презентация [203,5 K], добавлен 08.12.2014

  • The computer systems and unique possibilities for fulfillment before unknown offenses. The main risks and threats to information systems security in the internet. Internet as a port of escape of the confidential information and its damage minimization.

    контрольная работа [19,6 K], добавлен 17.02.2011

  • Global Warming is the greatest environmental threat of the 21st Century. The causes and effects of global warming. Explanation of the effects of global warming in both MEDCs and LEDCs. Evaluation of the different viewpoints held about global warming.

    презентация [639,6 K], добавлен 25.04.2014

  • General characteristics of the personal security of employees. Bases of fight against a corruption in the tax service of Ukraine. Personal safety of the tax police, concept, content, principles. Legislative regulation of non-state security activity.

    реферат [24,7 K], добавлен 08.10.2012

  • It is impossible to discuss a future role of the United States of America in the world without understanding the global processes that have been taken place in the world over the last several years.

    сочинение [4,0 K], добавлен 10.03.2006

  • NANO Security - сплоченная команда молодых специалистов: программистов, аналитиков, тестировщиков, менеджеров. Предметная область, назначение разработки, требования к программному изделию, системы управления обучением. Обзор языков программирования.

    отчет по практике [1,1 M], добавлен 22.07.2012

  • Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.

    реферат [20,9 K], добавлен 19.12.2013

  • The definition of term "economic security of enterprise" and characteristic of it functional components: technical and technological, intellectual and human resources component, information, financial, environmental, political and legal component.

    презентация [511,3 K], добавлен 09.03.2014

  • The need for human society in the social security. Guarantee of social security in old age, in case of an illness full or partial disability, loss of the supporter, and also in other cases provided by the law. Role of social provision in social work.

    презентация [824,4 K], добавлен 16.10.2013

  • The geographic characteristics of the Novaya Zemlya archipelago in the Arctic Ocean. The history of the test site at Novaya Zemlya. Learning the facts about the nuclear test site. Description of the scope and consequences of the explosion of King-bomb.

    презентация [1,2 M], добавлен 18.10.2015

  • Every day the world economy becomes more global. This tendency hasn't avoided Ukraine. Many domestic companies have already felt on themselves negative consequences of this process. New conditions of business dealing is first of all new possibilities.

    реферат [26,9 K], добавлен 27.10.2010

  • The corporate development history and current situation strategy of the Computacenter. Opportunities and threats for Computacenter on the analysis of IT-industry and macro-environmental analysis. The recommendations for the future strategic direction.

    контрольная работа [27,5 K], добавлен 17.02.2011

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.