SlideShare a Scribd company logo
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Session01:
introduction
Disinformation/Malign Influence Training
Disarm Foundation | 2022
1
1
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Questions for class
● Do you want 30 mins or 1 hour lunch break?
● What are your backgrounds?
β—‹ Course will include some information security, data science, psychology, risk
analysis, and python coding
● What do you want to get out of this course?
2
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
About this course
3
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Your instructors, and the Disarm Foundation
Today’s instructors:
● SJ Terp
● Pablo Breuer
● Mike Klein
The Disarm Foundation:
https://www.disarm.foundation/
4
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Disarm Foundation: Frameworks and Training
https://www.disarm.foundation/
5
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course outcomes
After successfully completing the course, students will be able to:
● Elaborate how information security and cognitive security interact
● Evaluate persuasive technology at different scales
● Evaluate influence operation mechanisms and tracking techniques
● Use tools to investigate account and network-level coordinated
inauthentic activities
● Understand ethical behaviour around misinformation and disinformation
response and research
6
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course structure
Understand environment
1: Introduction
2: Information and response
3: Threats
Set up project
4: Project setup
5: Data collection
Manage components
6: Influence
7: Narratives
8: Behaviours
Manage risk
9: Risk assessment
10: Risk measurement
Hotwash
Module 1: Introduction
● Introductions
● Defining β€œcognitive security”
● Cognitive Security
Exercise: play games
7
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course schedule
8
DAY 1: understanding cogsec
9-10:30
Session 1: introduction
Exercise: play games
10:30-12
Session 2: information and response
Exercise: information & response landscapes
12-1 lunch
1-2:30
Session 3: threats
Exercise: threat landscape
2:30-4
Session 4: project setup
Exercise: set up your project resources
4-5:30
Session 5: data collection
Exercise: gather data for your project
DAY 2: managing cogsec
9-10:30
Session 6: influence
Exercise: influence analysis
10:30-12
Session 7: narratives
Exercise: narrative analysis
12-1 lunch
1-2:30
Session 8: behaviours
Exercise: behaviour analysis
2:30-4
Session 9: risk assessment
Exercise: purple team
4-5:30
Session 10: risk prioritisation
Exercise: hotwash
Each session is 55 mins taught, 30 mins exercise
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course Project
9
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Course project
Explore an information harm area or incident
of your choice:
● Assess information, harms, and response
environments
● Organise project
● Gather data
● Identify incident artifacts
● Identify narratives and behaviours
● Suggest counters
● Report out - in a format of your choice
10
Image: https://commons.wikimedia.org/wiki/File:Project_Management_(project_control).png
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Start thinking about your project
Outputs
● Tweets, report, alert?
● Data science, notes, examples?
Topics
● Medical
● Disaster
● Elections
● Business
● War
Geography
● Region
● Country
● City etc
Creators
● Nationstate / criminal / insider / etc
Community
● Who is affected?
Harms
● Misinformation
● Disinformation
● Conspiracies
● Rumours
Channels
● Social media
● URLs
● Offline
11
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Defining β€œCognitive
Security”
12
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Media: Information disorder
13
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Military: Information Operations
14
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security
PHYSICAL
SECURITY
CYBER
SECURITY
COGNITIVE
SECURITY
15
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security: both of them
β€œCognitive Security is the application of
artificial intelligence technologies, modeled
on human thought processes, to detect
security threats.” - XTN
MLSec - machine learning in infosec
● ML used in attacks on information
systems
● ML used to defend information systems
● Attacking ML systems and algorithms
● β€œAdversarial AI”
β€œCognitive Security (COGSEC) refers to
practices, methodologies, and efforts made
to defend against social engineering
attemptsβ€’intentional and unintentional
manipulations of and disruptions to cognition
and sensemaking” - cogsec.org
CogSec - social engineering at scale
● Manipulation of individual beliefs,
belonging, etc
● Manipulation of human communities
● β€œAdversarial cognition”
16
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Social Engineering: both of them
β€œthe use of centralized planning in an
attempt to manage social change and
regulate the future development and
behavior of a society.”
● Mass manipulation etc
β€œthe use of deception to manipulate
individuals into divulging confidential or
personal information that may be used for
fraudulent purposes.”
● Phishing etc
17
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security: Information Security applied to
disinformation+
β€œCognitive security is the application of information security principles, practices, and tools
to misinformation, disinformation, and influence operations.
It takes a socio-technical lens to high-volume, high-velocity, and high-variety forms of
β€œsomething is wrong on the internet”.
Cognitive security can be seen as a holistic view of disinformation from a security
practitioner’s perspective
18
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
How Cognitive Security
and information security
fit together
19
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Information Security vs Cognitive Security: Objects
Computers
Networks
Internet
Data
Actions
People
Communities
Internet
Beliefs
Actions
20
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Hybrids, and other attack types from infosec
21
● Hybrid: cyber + cognitive + physical
● Cyber supporting cognitive
● Cognitive supporting cyber
● Cyber attack forms adapted to cognitive
Image: Verizon DBIR https://www.verizon.com/business/resources/reports/dbir/
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Your role
● Manage lifecycles
● Manage risk
● Manage teams
● Manage objects
● Manage behaviours
● Manage endpoints
● Manage toolset
22
Image: https://www.wsj.com/articles/SB947800469939459913
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
23
Manage Lifecycles
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec lifecycle: NIST
24
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: Lifecycle models
25
Images: WHO Europe, https://www.nist.gov/cyberframework/online-learning/components-framework
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
26
Manage Risk
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: risk management models
Image: https://www.risklens.com/infographics/fair-model-on-a-page
27
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
CogSec: Managing risk and resources
Manage risks
● Risk management
β—‹ assessment, reduction, remediation
● Frequency:
β—‹ how often?
● Losses:
β—‹ How bad? How big? Who to?
β—‹ Harm categories: physical,
psychological, economic,
reputational, cultural, political
● Environment
β—‹ Assets, threats, vulnerabilities
Manage resources
● Mis/disinformation is everywhere
● Detection, mitigation, response
● You never have enough resources
β—‹ People
β—‹ Technologies
β—‹ Time
β—‹ Attention
β—‹ Connections
28
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
CogSec: Managing the whole system
Information
Landscape
β€’ Information seeking
β€’ Information sharing
β€’ Information posting
β€’ Information sources
β€’ Information voids
Harms
Landscape
β€’ Motivations
β€’ Sources/ Starting points
β€’ Effects
β€’ Misinformation narratives
β€’ Hateful speech narratives
β€’ Crossover narratives
β€’ Tactics and Techniques
β€’ Artifacts
Response
Landscape
β€’Monitoring organisations
β€’Countering organisations
β€’Coordination
β€’Existing policies
β€’Technologies
β€’etc
29
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
30
Manage Teams
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: SOCs
31
Image: https://www.comptia.org/content/articles/what-is-a-security-operations-center
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cognitive Security Operations Centers
32
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
33
Manage Objects
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec model: STIX
Image: https://github.com/traut/stixview
34
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: interacting layers of attack/respond
Campaigns
Incidents
Narratives and
behaviours
Artifacts
a
t
t
a
c
k
e
r
d
e
f
e
n
d
e
r
35
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec STIX:
Transferable
situation reports
CAMPAIGN
INCIDENT
NARRATIVE
ARTIFACT
36
Image:
https://africacheck.org/fact-checks/reports/anatomy-
disinformation-campaign-who-what-and-why-deliber
ate-falsehoods-twitter Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: Malware
37
Image: https://www.avast.com/c-malware
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: Narratives
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
39
Manage Behaviours
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec model: ATT&CK
Image: https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/the-attck%E2%84%A2-navigator-a-new-open-source 40
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: DISARM Red
41
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec model: MITRE DEFEND
Image: https://therecord.media/mitre-releases-d3fend-defensive-measures-complimentary-to-its-attck-framework/ 42
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cogsec: DISARM Blue
43
Image: DISARM Foundation
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
44
Manage Toolset
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
45
Infosec tools
Image: https://scet.berkeley.edu/scet-explains-cybersecurity/
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Typical cogsec toolset
Data gathering
● Crowdtangle
● Tineye / Yandex
● Hypothes.is
● Maltego
● Profil3r
● CheckUserNames
● Hootsuite
Data storage and sharing
● CSVs
● STIX / TAXII
● Archive.org
Information sharing
● MISP
● Ticketing system
● Googledocs
● Spreadsheets
Response
● Googledocs &
spreadsheets
Analysis
● Jupyter notebooks
● Python libraries
● (Pandas)
● Gephi
● AMITT Navigator
● inVid
● BuiltWith
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
47
Manage Endpoints
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Infosec: Security training
Image: https://www.firewelltechnologysolutions.com/two-factor-authentication-and-account-security/ 48
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
CogSec: Fake news training
Image: https://www.dhs.gov/sites/default/files/publications/19_0717_cisa_the-war-on-pineapple-understanding-foreign-interference-in-5-steps.pdf 49
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Your first exercise: play
games
50
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Using games to prepare your responses
Learning game
● fun experience that teaches you
something
● Useful for training large numbers of
people simultaneously
Red team / Purple team
● test an organisation’s defences by
thinking like a bad guy
● Useful for finding system vulnerabilities,
and predicting future moves
Tabletop exercise
● key people responding to a simulated
event
● Useful for creating cohesive teams.
Often large scale
Simulation
● imitation of processes and
environment
● Useful for β€œwhat if” automated tests
51
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
52
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Assessing a game: look for…
Coverage
● Who is this designed for?
● Public, influencers, media etc
● Techniques covered
● Harms covered
● rumours, misinformation,
disinformation, conspiracy theories etc
● Variants, e.g. languages / countries
Viewpoint
● Whose point of view are you playing from?
● Do you β€œbreak it then fix it”?
53
Outcomes
● What did you learn from the game?
● What are the rewards from the game?
Continuation
● Where does it suggest you go or do next?
● Would you recommend it to your friends?
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
A sampling of disinformation games
Game Point of view Audience Creator
Bad News Game,
Harmony Square,
Go Viral
Creator Public DROG
News Hero Media Public NATO stratcom
Cranky Uncle Family member Public Monash uni
Disinformation Diaries Politician Political staff Alliance of dems
Learn2Discern Media Public Ukraine
Fakey Fact checker Public Uni of Indiana
54
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Other disinformation games
Online games
● Fake News: the game
https://www.rand.org/research/projects/truth-decay/fighting-disinformation/search/items/fake-news-
the-game.html
● Checkology misinformation practice (e.g. https://checkology.org/lessons/teacher/163/elements/2471)
● Polititruth https://www.cinqmarsmedia.com/politifact/index.html (Politifact, Tinder-style)
● BBC iReporter
https://www.bbc.co.uk/news/resources/idt-8760dd58-84f9-4c98-ade2-590562670096
● Digital Compass https://www.gamesforchange.org/game/digital-compass/
● The Republia Times https://www.gamesforchange.org/game/the-republia-times/
● Interland https://beinternetawesome.withgoogle.com/en_us/interland
● Propaganda Game https://propagandagame.org/
● Factitious http://factitious.augamestudio.com/#/
● Hindsight2020 https://www.hindsight2020.eu/
Card games
● Fake News
● Paladone
55
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Assessing a game: look for…
Coverage
● Who is this designed for?
● Public, influencers, media etc
● Techniques covered
● Harms covered
● rumours, misinformation,
disinformation, conspiracy theories etc
● Variants, e.g. languages / countries
Viewpoint
● Whose point of view are you playing from?
● Do you β€œbreak it then fix it”?
56
Outcomes
● What did you learn from the game?
● What are the rewards from the game?
Continuation
● Where does it suggest you go or do next?
● Would you recommend it to your friends?
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Annex: Some
disinformation games to
choose from
57
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
News Hero
https://www.thenewshero.org/ and
https://www.facebook.com/thenewshero
NATO Stratcom CoE
58
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Bad News Game
https://www.getbadnews.com/#intro
DROG and Uni Cambridge
Techniques:
● Impersonation
● Emotion
● Polarization
● Conspiracy
● Discredit
● Trolling
59
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Harmony Square
https://www.harmonysquare.game/en
DROG/ GEC
Techniques:
● Trolling
● Emotion
● Amplification
● Escalation
60
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Go Viral Game
https://www.goviralgame.com/
University of Cambridge, DROG
Techniques:
● Emotion
● Fake expert
● Conspiracy
61
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Disinformation Diaries
https://www.allianceofdemocracies.org/initiatives/the
-campaign/the-disinformation-diaries/
Ora Tanner, Alliance of Democracies Foundation
62
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Cranky Uncle
https://crankyuncle.com/
John Cook, Monash Uni, Autonomy
63
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Learn 2 Discern game
http://irex.mocotms.com/ml_en/story_html5.html?l
ms=1
Ukrainian
Takes a while to do, but a lovely game
64
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Fakey
https://fakey.osome.iu.edu/
Indiana University (Osome)
65
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Hindsight2020
https://www.hindsight2020.eu/
European Union
66
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Fake It to Make It
https://www.fakeittomakeitgame.com/
67
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
The propaganda game
https://propagandagame.org/
https://www.facebook.com/The-Propagand
a-Game-212679222850847
68
Disinformation/Malign
Influence
Training,
Disarm
Foundation
|
2022
Factitious
http://factitious.augamestudio.com/#/ - dead?
http://factitious-pandemic.augamestudio.com/#/
Maggie Farley/ Bob Hone, AU Game Lab, Jolt
program
69

More Related Content

PDF
CSW2022_07_narratives.pptx.pdf
PPTX
Disarm vanguards 2022-02-25 (3)
PDF
CSW2022_06_influence.pptx.pdf
PDF
CSW2022_05_data collection.pptx.pdf
PDF
CSW2022_02_info_response_environments.pptx.pdf
PDF
CSW2022_08_behaviours.pptx.pdf
PDF
CSW2022_09_riskassessment.pptx.pdf
PPTX
2022-08-13_cogsec_defcon.pptx
CSW2022_07_narratives.pptx.pdf
Disarm vanguards 2022-02-25 (3)
CSW2022_06_influence.pptx.pdf
CSW2022_05_data collection.pptx.pdf
CSW2022_02_info_response_environments.pptx.pdf
CSW2022_08_behaviours.pptx.pdf
CSW2022_09_riskassessment.pptx.pdf
2022-08-13_cogsec_defcon.pptx

What's hot (20)

PPTX
Distributed defense against disinformation: disinformation risk management an...
PPTX
Sj terp emerging tech radar
PPTX
disinformation risk management: leveraging cyber security best practices to s...
PPTX
Cognitive security: all the other things
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PDF
CanSecWest_cogsec_course_01_introduction.pdf
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PDF
Cyber Threat Intelligence
PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
10 Critical Corporate Cyber Security Risks
PDF
Cyber Threat Intelligence
PDF
Osint presentation nov 2019
PDF
Cyber Threat Intelligence - It's not just about the feeds
PPTX
Social Networking Security
PDF
Open source intelligence information gathering (OSINT)
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
Osint {open source intelligence }
Distributed defense against disinformation: disinformation risk management an...
Sj terp emerging tech radar
disinformation risk management: leveraging cyber security best practices to s...
Cognitive security: all the other things
Threat Intelligence 101 - Steve Lodin - Submitted
CanSecWest_cogsec_course_01_introduction.pdf
Effective Threat Hunting with Tactical Threat Intelligence
Cybersecurity Awareness E-Book - WeSecureApp
Cyber Threat Intelligence
Cyber Threat Hunting: Identify and Hunt Down Intruders
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Cyber threat intelligence: maturity and metrics
10 Critical Corporate Cyber Security Risks
Cyber Threat Intelligence
Osint presentation nov 2019
Cyber Threat Intelligence - It's not just about the feeds
Social Networking Security
Open source intelligence information gathering (OSINT)
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Osint {open source intelligence }
Ad

Similar to CSW2022_01_introduction.pptx.pdf (20)

PDF
CSW2022_10_risk_prioritisation.pptx.pdf
PDF
CSW2022_03_threat_environment.pptx.pdf
PDF
CSW2022_04_project_setup.pptx.pdf
PDF
Incident preprearedness - Cybersecurity Module 7.pdf
PPTX
Cyber training 23 5 2012
PDF
Adversary Playbook Tactical Assessment of Protection Techniques
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Cyber Security Awareness
PDF
Fetc 2022 Cybersecurity Panel
PPTX
How to Build a Successful Incident Response Program
PDF
Identity Intelligence: From Reactionary Support to Sustained Enabler
PDF
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
PDF
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
PPTX
Webinar: Scale up you Cyber Security Strategy Webinar
PPTX
Drone-based Learning for Project-based Learning (for printing only-real).pptx
PPTX
AMW_RAT_2022-04-28 (2).pptx
PPT
13734729.ppt
PPTX
Information Security vs IT - Key Roles & Responsibilities
Β 
PDF
Cyber Security - awareness, vulnerabilities and solutions
CSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_03_threat_environment.pptx.pdf
CSW2022_04_project_setup.pptx.pdf
Incident preprearedness - Cybersecurity Module 7.pdf
Cyber training 23 5 2012
Adversary Playbook Tactical Assessment of Protection Techniques
Dealing with Information Security, Risk Management & Cyber Resilience
Cyber Security Awareness
Fetc 2022 Cybersecurity Panel
How to Build a Successful Incident Response Program
Identity Intelligence: From Reactionary Support to Sustained Enabler
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Webinar: Scale up you Cyber Security Strategy Webinar
Drone-based Learning for Project-based Learning (for printing only-real).pptx
AMW_RAT_2022-04-28 (2).pptx
13734729.ppt
Information Security vs IT - Key Roles & Responsibilities
Β 
Cyber Security - awareness, vulnerabilities and solutions
Ad

Recently uploaded (20)

PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Internet___Basics___Styled_ presentation
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
DOCX
Unit-3 cyber security network security of internet system
PPTX
Funds Management Learning Material for Beg
PPTX
innovation process that make everything different.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPT
tcp ip networks nd ip layering assotred slides
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
presentation_pfe-universite-molay-seltan.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Internet___Basics___Styled_ presentation
Sims 4 Historia para lo sims 4 para jugar
SASE Traffic Flow - ZTNA Connector-1.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
An introduction to the IFRS (ISSB) Stndards.pdf
Paper PDF World Game (s) Great Redesign.pdf
Unit-3 cyber security network security of internet system
Funds Management Learning Material for Beg
innovation process that make everything different.pptx
Introduction to Information and Communication Technology
SAP Ariba Sourcing PPT for learning material
QR Codes Qr codecodecodecodecocodedecodecode
PptxGenJS_Demo_Chart_20250317130215833.pptx
tcp ip networks nd ip layering assotred slides

CSW2022_01_introduction.pptx.pdf