Prevent and Reduce the Risk of Implementing the Main Cybersecurity Threats
Keywords:cognitive warfare, cyber challenges and threats, cyber defense, cyber security, cyber space, hybrid threats, national cyber defense system, system of cyber threats early detection
In hybrid conflicts of any intensity, hostilities (operations) are an element of other (non-force) actions mutually coordinated according to a single plan, mainly economic, political, diplomatic, informational, psychological, cyber, cognitive, etc. This creates destabilizing internal and external processes in the state that is the object of aggression (concern and discontent of the population, migration, acts of civil disobedience, etc.). The article examines the effective organizational and technical countermeasures against hybrid threats, national cyber defense systems in the developed countries. The article also presents the results of the investigations into the effects of the information hybrid threats through cyberspace on social, technical, socio and technical systems. The composition of the system of early efficient detection of the above hybrids is proposed. The results of the structural and parametric synthesis of the system are described. The recommendations related to the system implementation are given. A number of sufficient components for the effective design and development of the national cyber defense system of the state are proposed.
F. Hoffman, “Hybrid Warfare and Challenges,” Joint Forces Quarterly, issue 52, pp. 34-39, 2009.
H. Gunneriusson, “Hybrid warfare: Development, historical context, challenges and interpretations,” Icono 14, vol. 19, issue 1, pp. 15-37, 2021. DOI: ri14.v19i1.160
B. Boyer, “Countering hybrid threats in cyberspace,” Cyber Defense Review, vol. 2, ed. 3, 2015.
N. Iancu, A. Fortuna, C. Barna, Countering Hybrid Threats: Lessons Learned from Ukraine, IOS Press BV, Amsterdam, 2016, 286 p.
S. Harris, Cyberwar @: The Fifth Theater of War, 2014.
J. Suler, “The online disinhibition effect,” Cyber Psychology and Behavior, vol. 7, issue 3, 321-326, 2004.
Cyber War: The Next Threat to National Security and What to Do About It by Richard A. Clarke – http://indianstrategicknowledgeonline.com/web/Cyber_War_-_The_Nex_Threat_to_National_Security_and_What_to_Do_About_It_(Richard_A_Clarke)_(2010).pdf, 2010.
P. Eronen, Russian Hybrid Warfare: How to Confront a New Challenge to the West, FDD PRESS, 2016, 27 p.
B. Renz and H. Smith, Russia and Hybrid Warfare – Going Beyond the Label. [Online]. Available at: http://www.helsinki.fi/aleksanteri/english/publications/presentations/papers/ap_1_2016.pdf.
Cyberspace Threats and Vulnerabilities. [Online]. Available at: http://www.informationclearinghouse.info/pdf/cyber_warfare_case_for_action.pdf.
P. Cornish, R. Hughes, and D. Livingstone, Cybers Pace and the National Security of the United Kingdom. Threats and Responses, A Chatham House Report, March 2009.
What is Cyber Threat Intelligence, and why you Need It, 2017 [Online]. Available at: https://blog.unloq.io/what-is-cyber-threat-intelligence-and-why-you-need-it-fd33e24954da.
M. Mateski, C. Trevino, and C. Veitch, et al. Cyber Threat Metrics. Sandia National Laboratories Report, March 2012.
J. Andress, S. Winterfeld, R. Rogers, Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, Amsterdam: Syngress/Elsevier, 2011, 289 p.
I. R. Porche III, C. Paul, M. York, et al., Redefining Information Warfare Boundaries for an Army in a Wireless World. [Online]. Available at: https://www.rand.org/content/dam/rand/pubs/monographs/mg1100/mg1113/rand_mg1113.pdf.
Putin’s asymmetric assault on democracy in Russia and Europe: implications for U.S. National security a minority staff report prepared for the use of the committee on foreign relations United States Senate one hundred fifteenth congress second session January 10, 2018. [Online]. Available at: http://www.gpoaccess.gov/congress/index.html
Information operation against Ukraine Armed Forces officials “If not the Generals…,” http://colonelcassad.livejournal.com/2474409.html, http://www.segodnia.ru/content/168270, https://topwar.ru/85589-esli-by-ne-generaly-pozornaya-istoriya-ukrainskoy-armii.html
Yu. Danyk, O. Pisarchuk, “Method of structural parametric synthesis of complex ergatic distributed informational-controlling system of response on conflict situation,” Journal of Automation and Information Sciences, Begell Hours, inc publishers, USA, vol. 46, issue 3, pp. 47–69, 2014.
Yu. Danyk, T. Maliarchuk, Ch. Briggs, “Hybrid war: High-tech, information and cyber conflicts, connections,” The Quarterly Journal, vol. 16, no. 2, pp. 524, 2017. URL: http://www.jstor.org/stable/26326478.
E. Stoycheff, E. C. Nisbet, “Priming the costs of conflict? Russian public opinion about the 2014 Crimean conflict,” International Journal of Public Opinion Research, vol. 29, issue 4, edw020, 2016.
P. Duggan, “Strategic development of special warfare in cyberspace,” Joint Force Quarterly, vol. 79, pp. 46-53, 2015.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.