Russian Cyber Sovereignty: One Step Ahead
... disinformation material and malware. Foreign actors can also steal valuable and protected information. Needless to mention that all of the mentioned types of information can be manipulated and adapted as needed for cyber operations. Pavel Karasev: Cybersecurity and NATO’s Nuclear Capability The final layer consists of the users who shape the cyberspace experience and its nature by communicating with each other, creating and spreading content. The main vulnerability of the users are other manipulative ...
08.09.2020