Details
Nothing to say, yet
Nothing to say, yet
So three, two, one, let's start. So colleagues, next speaker is Ekaterina. She is an expert in cyberterrorism and she will tell us the – about it, and we can ask questions about cyberterrorism, it's something new. We have the usual cyberterrorism in antithetic world, so this is the new form which we are not got used to it. So Ekaterina, please tell us about cyberterrorism and how to deal with it. Okay. Cyberterrorism. Cyberterrorism is a legal activity in cyberspace which is a threat to the state, individuals, people and society. The main purpose of cyberterrorism is to influence the economic and political events, history, creation, emergence and development of cyberterrorism concept. The concept of cyberterrorism was created in 1919, when the Internet was developing. The main purpose of cyberterrorism is to influence the economic and political events, history, creation, emergence and development of cyberterrorism concept. The main purpose of cyberterrorism is to influence the economic and political events, history, creation, emergence and development of cyberterrorism concept. The main purpose of cyberterrorism is to influence the economic and political events, history, creation, emergence and development of cyberterrorism concept. The main purpose of cyberterrorism is to influence the economic and political events, history, creation, emergence and development of cyberterrorism concept. Cyberterrorism can create a negative relationship between states and create difficult situations, when it becomes much more difficult to deal with attacks. For example, during the COVID-19 pandemic, we had a lot of cyberattacks on healthcare, on hospitals and on people who work with information on vaccines. Not only the main information was subject to attacks, but also personal information, the potential of people who are in the hospital. The results of cyberterrorism show us how attacks of this kind can have a negative impact not only on certain people, but also on the whole society. In the end, I would like to say that cyberterrorism can usually get information and work with different countries. In the end, I would like to say that cyberterrorism can usually get information and work with different countries. Thank you, Ekaterina, for your speech. I think it was very interesting. I think that this is the end of my presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Thank you, Ekaterina, for your presentation. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware. Malware.