dc.contributor.author | Kuperstein, L. | uk |
dc.contributor.author | Lukichov, V. | uk |
dc.contributor.author | Radetska, A. | uk |
dc.contributor.author | Dudatyev, A. | uk |
dc.contributor.author | Куперштейн, Л. М. | uk |
dc.contributor.author | Лукічов, В. В. | uk |
dc.contributor.author | Радецька, А. О. | uk |
dc.contributor.author | Дудатьєв, А. В. | uk |
dc.date.accessioned | 2025-06-24T11:35:21Z | |
dc.date.available | 2025-06-24T11:35:21Z | |
dc.date.issued | 2025 | uk |
dc.identifier.citation | Kuperstein L., Lukichov V., Radetska A., Dudatyev A. System for Organizing Cyber Operations in the Context of Military Aggression // Science and Innovation. 2025. Vol. 21(3). Pp. 86–98. | uk |
dc.identifier.issn | 2409-9066 | uk |
dc.identifier.uri | https://ir.lib.vntu.edu.ua//handle/123456789/46725 | |
dc.description.abstract | Introduction. In the modern world, the importance of information and communication technologies, as well as
the threats associated with cyberattacks during military aggression, has signifi cantly increased. The widespread
adoption of these technologies is accompanied by a high level of risk from cyber threats targeting various objects
and management systems.
Problem Statement. Cyber operations have become a substantial technique for conducting warfare in the
context of military confl ict. Access to sensitive military, economic, or strategic data can support their execution
and implementation. The leakage of this information can cause signifi cant damage to the enemy, both militarily
and politically, undermining their authority and potentially disrupting or even destroying specifi c military and
political plans. Attacks on communication and management systems, or their complete disabling, can lead to collapse and devastation in the enemy's ranks, ultimately resulting in their defeat. Therefore, it is crucial to conduct
research and improve methods for cyber operations, as well as to ensure eff ective defense against such threats.
Purpose. The primary aim of this research is to enhance the organization of cyber operations in military contexts by utilizing essential principles of management and off ering recommendations for their optimization.
Materials and Methods. This research is based on an analysis of theoretical sources on cyber operations, as
well as practical examples of previous cyber incidents in military settings.
Results. A framework for cyber operations has been developed. The main stages of cyber operations within the
management domain have been explored. A typical management system structure has been proposed. Key recommendations for improving the management and functionality of cyber operation systems have been provided.
Conclusions. This study highlights the signifi cance of developing and implementing eff ective management
strategies. The improvement of these processes is vital to ensuring reliable security and a robust response to cyber
threats during military confl ict. | uk_UA |
dc.language.iso | uk_UA | uk_UA |
dc.publisher | National Academy of Sciences of Ukraine | uk |
dc.relation.ispartof | Science and Innovation. Vol. 21(3) : 86–98. | uk |
dc.subject | cyber operation | uk |
dc.subject | cyber weapons | uk |
dc.subject | cyber attack | uk |
dc.subject | cyber war | uk |
dc.subject | military aggression | uk |
dc.subject | management functions | uk |
dc.title | System for Organizing Cyber Operations in the Context of Military Aggression | uk |
dc.title.alternative | Система організації кібероперацій в умовах військової агресії | uk_UA |
dc.type | Article, Scopus-WoS | |
dc.relation.references | https://scinn-eng.org.ua/ojs/index.php/ni/article/view/788 | uk |
dc.identifier.doi | https://doi.org/10.15407/scine21.03.086 | uk |
dc.identifier.orcid | https://orcid.org/0000-0001-6737-7134 | uk |
dc.identifier.orcid | https://orcid.org/0000-0002-3423-5436 | uk |
dc.identifier.orcid | https://orcid.org/0009-0009-5687-5651 | uk |
dc.identifier.orcid | https://orcid.org/0000-0002-7944-2404 | uk |