Показати скорочену інформацію

dc.contributor.authorKuperstein, L.uk
dc.contributor.authorLukichov, V.uk
dc.contributor.authorRadetska, A.uk
dc.contributor.authorDudatyev, A.uk
dc.contributor.authorКуперштейн, Л. М.uk
dc.contributor.authorЛукічов, В. В.uk
dc.contributor.authorРадецька, А. О.uk
dc.contributor.authorДудатьєв, А. В.uk
dc.date.accessioned2025-06-24T11:35:21Z
dc.date.available2025-06-24T11:35:21Z
dc.date.issued2025uk
dc.identifier.citationKuperstein L., Lukichov V., Radetska A., Dudatyev A. System for Organizing Cyber Operations in the Context of Military Aggression // Science and Innovation. 2025. Vol. 21(3). Pp. 86–98.uk
dc.identifier.issn2409-9066uk
dc.identifier.urihttps://ir.lib.vntu.edu.ua//handle/123456789/46725
dc.description.abstractIntroduction. In the modern world, the importance of information and communication technologies, as well as the threats associated with cyberattacks during military aggression, has signifi cantly increased. The widespread adoption of these technologies is accompanied by a high level of risk from cyber threats targeting various objects and management systems. Problem Statement. Cyber operations have become a substantial technique for conducting warfare in the context of military confl ict. Access to sensitive military, economic, or strategic data can support their execution and implementation. The leakage of this information can cause signifi cant damage to the enemy, both militarily and politically, undermining their authority and potentially disrupting or even destroying specifi c military and political plans. Attacks on communication and management systems, or their complete disabling, can lead to collapse and devastation in the enemy's ranks, ultimately resulting in their defeat. Therefore, it is crucial to conduct research and improve methods for cyber operations, as well as to ensure eff ective defense against such threats. Purpose. The primary aim of this research is to enhance the organization of cyber operations in military contexts by utilizing essential principles of management and off ering recommendations for their optimization. Materials and Methods. This research is based on an analysis of theoretical sources on cyber operations, as well as practical examples of previous cyber incidents in military settings. Results. A framework for cyber operations has been developed. The main stages of cyber operations within the management domain have been explored. A typical management system structure has been proposed. Key recommendations for improving the management and functionality of cyber operation systems have been provided. Conclusions. This study highlights the signifi cance of developing and implementing eff ective management strategies. The improvement of these processes is vital to ensuring reliable security and a robust response to cyber threats during military confl ict.uk_UA
dc.language.isouk_UAuk_UA
dc.publisherNational Academy of Sciences of Ukraineuk
dc.relation.ispartofScience and Innovation. Vol. 21(3) : 86–98.uk
dc.subjectcyber operationuk
dc.subjectcyber weaponsuk
dc.subjectcyber attackuk
dc.subjectcyber waruk
dc.subjectmilitary aggressionuk
dc.subjectmanagement functionsuk
dc.titleSystem for Organizing Cyber Operations in the Context of Military Aggressionuk
dc.title.alternativeСистема організації кібероперацій в умовах військової агресіїuk_UA
dc.typeArticle, Scopus-WoS
dc.relation.referenceshttps://scinn-eng.org.ua/ojs/index.php/ni/article/view/788uk
dc.identifier.doihttps://doi.org/10.15407/scine21.03.086uk
dc.identifier.orcidhttps://orcid.org/0000-0001-6737-7134uk
dc.identifier.orcidhttps://orcid.org/0000-0002-3423-5436uk
dc.identifier.orcidhttps://orcid.org/0009-0009-5687-5651uk
dc.identifier.orcidhttps://orcid.org/0000-0002-7944-2404uk


Файли в цьому документі

Thumbnail

Даний документ включений в наступну(і) колекцію(ї)

Показати скорочену інформацію