HYBRID CONSTRUCTION OF CYBER SECURITY SYSTEM: ADMINISTRATIVE AND LEGAL PRINCIPLES OF MILITARY-CIVIL COOPERATION

O. Ponomarov, Serhii Pyvovarchuk, L. Kozubtsova, I. Kozubtsov, T. Bondarenko, T. Tereshchenko
{"title":"HYBRID CONSTRUCTION OF CYBER SECURITY SYSTEM: ADMINISTRATIVE AND LEGAL PRINCIPLES OF MILITARY-CIVIL COOPERATION","authors":"O. Ponomarov, Serhii Pyvovarchuk, L. Kozubtsova, I. Kozubtsov, T. Bondarenko, T. Tereshchenko","doi":"10.28925/2663-4023.2023.19.109121","DOIUrl":null,"url":null,"abstract":"National security of the state is one of the main factors of stable development of society. However, Ukraine and the Armed Forces of Ukraine are forced to counter a hybrid war using cyberspace. It has been established that currently there is no unified vision regarding the methodology of countering wars in a hybrid form. The lack of a countermeasure methodology requires a review of existing approaches to guaranteeing and maintaining state security. The purpose of the article. Justification of the need to create hybrid troops to neutralize cyber threats to the Armed Forces of Ukraine and methods of its implementation on the basis of military-civilian cooperation. Materials and methods. To solve the tasks, a set of theoretical research methods was used: historical analysis and generalization of scientific literature on the research problem; structural and genetic analysis and synthesis when specifying the object and subject of research; the method of going from the abstract to the concrete; the method of analytical and comparative analysis in the analytical and comparative evaluation of the novelty of research results; synthesis and generalization - to justify the methodological and methodical foundations of the research; generalization – formulation of conclusions and recommendations regarding the continuation of further research. Result. A key hypothesis was formed that an effective tool in countering hybrid warfare can be achieved through the use of hybrid troops. Developing this hypothesis substantiates the philosophical idea of the need to create hybrid cyber armies on the basis of military-civilian formations. Foreign experience confirms the high efficiency of military-civilian formations. On the basis of the current legal acts, a method of implementation is proposed. The practical significance of the study lies in the possibility of obtaining advantages in the cyberspace of the Armed Forces of Ukraine during active hybrid wars due to the formation of units of hybrid troops of the Armed Forces of Ukraine.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2023.19.109121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

National security of the state is one of the main factors of stable development of society. However, Ukraine and the Armed Forces of Ukraine are forced to counter a hybrid war using cyberspace. It has been established that currently there is no unified vision regarding the methodology of countering wars in a hybrid form. The lack of a countermeasure methodology requires a review of existing approaches to guaranteeing and maintaining state security. The purpose of the article. Justification of the need to create hybrid troops to neutralize cyber threats to the Armed Forces of Ukraine and methods of its implementation on the basis of military-civilian cooperation. Materials and methods. To solve the tasks, a set of theoretical research methods was used: historical analysis and generalization of scientific literature on the research problem; structural and genetic analysis and synthesis when specifying the object and subject of research; the method of going from the abstract to the concrete; the method of analytical and comparative analysis in the analytical and comparative evaluation of the novelty of research results; synthesis and generalization - to justify the methodological and methodical foundations of the research; generalization – formulation of conclusions and recommendations regarding the continuation of further research. Result. A key hypothesis was formed that an effective tool in countering hybrid warfare can be achieved through the use of hybrid troops. Developing this hypothesis substantiates the philosophical idea of the need to create hybrid cyber armies on the basis of military-civilian formations. Foreign experience confirms the high efficiency of military-civilian formations. On the basis of the current legal acts, a method of implementation is proposed. The practical significance of the study lies in the possibility of obtaining advantages in the cyberspace of the Armed Forces of Ukraine during active hybrid wars due to the formation of units of hybrid troops of the Armed Forces of Ukraine.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络安全体系的混合构建:军民合作的行政与法律原则
国家安全是社会稳定发展的主要因素之一。然而,乌克兰和乌克兰武装部队被迫利用网络空间对抗一场混合战争。已经确定的是,目前对以混合形式对抗战争的方法没有统一的看法。缺乏对策方法需要对现有的保障和维护国家安全的方法进行审查。文章的目的。建立混合部队以消除对乌克兰武装部队的网络威胁的必要性的理由及其在军民合作基础上的实施方法。材料和方法。为了解决这一问题,本文采用了一套理论研究方法:对研究问题的科学文献进行历史分析和归纳;在指定研究对象和主题时进行结构和遗传分析和综合;从抽象到具体的方法;研究成果新颖性分析与比较评价中的分析与比较分析法综合和概括-证明研究的方法和方法基础;概括-就进一步研究的继续提出结论和建议。结果。形成了一个关键假设,即通过使用混合部队可以实现对抗混合战争的有效工具。发展这一假设证实了需要在军民编队的基础上创建混合网络军队的哲学思想。国外的经验证实了军民编队的高效率。在现行法律行为的基础上,提出了一种实施方法。研究的现实意义在于,乌克兰武装部队混合部队的组建,使乌克兰武装部队在主动混合战争中获得网络空间优势的可能性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1