System for Organizing Cyber Operations in the Context of Military Aggression
Author
Kuperstein, L.
Lukichov, V.
Radetska, A.
Dudatyev, A.
Куперштейн, Л. М.
Лукічов, В. В.
Радецька, А. О.
Дудатьєв, А. В.
Date
2025Metadata
Show full item recordCollections
- JetIQ [460]
Abstract
Introduction. In the modern world, the importance of information and communication technologies, as well as
the threats associated with cyberattacks during military aggression, has signifi cantly increased. The widespread
adoption of these technologies is accompanied by a high level of risk from cyber threats targeting various objects
and management systems.
Problem Statement. Cyber operations have become a substantial technique for conducting warfare in the
context of military confl ict. Access to sensitive military, economic, or strategic data can support their execution
and implementation. The leakage of this information can cause signifi cant damage to the enemy, both militarily
and politically, undermining their authority and potentially disrupting or even destroying specifi c military and
political plans. Attacks on communication and management systems, or their complete disabling, can lead to collapse and devastation in the enemy's ranks, ultimately resulting in their defeat. Therefore, it is crucial to conduct
research and improve methods for cyber operations, as well as to ensure eff ective defense against such threats.
Purpose. The primary aim of this research is to enhance the organization of cyber operations in military contexts by utilizing essential principles of management and off ering recommendations for their optimization.
Materials and Methods. This research is based on an analysis of theoretical sources on cyber operations, as
well as practical examples of previous cyber incidents in military settings.
Results. A framework for cyber operations has been developed. The main stages of cyber operations within the
management domain have been explored. A typical management system structure has been proposed. Key recommendations for improving the management and functionality of cyber operation systems have been provided.
Conclusions. This study highlights the signifi cance of developing and implementing eff ective management
strategies. The improvement of these processes is vital to ensuring reliable security and a robust response to cyber
threats during military confl ict.
URI:
https://ir.lib.vntu.edu.ua//handle/123456789/46725
View/ Open
Related items
Showing items related by title, author, creator and subject.
-
Дорожня карта впровадження кібер-страхування в Україні
Приказюк, Н. В.; Гуменюк, Л. С.; Prykaziuk, N. V.; Gumenyuk, L. S. (ВНТУ, 2021)У статті проаналізовано процес впровадження кібер-страхування у світі та запропонована Дорожня карта його впровадження в Україні. Розглянуто ключові цілі та завдання, які стоять перед страховим ринком України та регулятором ... -
Cyber security on the internet
Kudran S.P; Boiko Y.V.; Кудрань, С. П.; Бойко, Ю. В. (ВНТУ, 2023)The purpose of the article is to define the place, role and function of cyber security. Cybersecurity plays an important role in the information technology sector. Information security has become one of the serious ... -
Кібербезпека в реаліях військового часу
Тюльпін, М. Л. (ВНТУ, 2023)Питання захисту від кібератак та посилення можливостей інформаційної безпеки держави та її інформаційного простору актуальна вимога в реаліях військового часу.