Affiliation:
1. Uniwersytet Warszawski
Abstract
The information contained in this chapter attempts to provide a comprehensive analysis of the phenomenon of influence operations as one of the most rapidly developing threats in cyberspace. It presents a number of considerations arising from a wide range of activities of different types of actors (state, non-state, etc.), as well as definitions of 'cyberspace', 'influence operations', and 'active measures'. It also discusses specific examples of influence operations, the tools used in their process and techniques to combat them. The chapter is based on the author's thesis entitled Influence operations on the security of users of cyberspace, written under the supervision of Dr. Jerzy Kosiński as part of the postgraduate course Cyber Security Management conducted at the Warsaw School of Economics.
Reference54 articles.
1. J. C. o. Staff,: Joint Publication 3-12 Cyberspace Operations, 08.06.2018.; w: https://nsarchive.gwu.edu/sites/default/files/documents/4560063/Joint-Chiefs-of-Staff-Joint-Publication-3-12.pdf.
2. Dela P. T., Założenia działań w cyberprzestrzeni, Warszawa: Wydawnictwo Naukowe PWN SA, 2022.
3. Office of Information Security. Washington University in St. Louis: Confi-dentiality, Integrity, and Availability: The CIA Triad, 2023; w: https://informationsecurity.wustl.edu/items/confidentiality-integrity-and-availability-the-cia-triad/.
4. Brangetto P/ i Veenendaal M. A.: Influence Cyber Operations: The Use of Cyberattacks in Support of Influence Operations. 2016 8th International Con-ference on Cyber Conflict (CyCon)., Tallinn, 2016.
5. Microsoft Corporation: Microsoft Digital Defense Report 2022, Microsoft, 2022.