{"title":"Catalysts of Cyber Threats on the Example of Visegrad Group Countries","authors":"Marek Górka","doi":"10.2478/pce-2022-0014","DOIUrl":null,"url":null,"abstract":"Abstract The article deals with cyber incidents that were recorded in the area of the V4 countries. It is important for the discussed topic to extract certain factors and with their help to characterise the conducted cyberattacks in terms of political motivations. The analysis tries to prove the existence of politically motivated cyberattacks. This, in turn, helps to determine the consequences of such cyber incidents. Moreover, the scale and magnitude of the cyberattack can be information to determine the strategic maturity and cyber capabilities of the adversary. Thus, the incidents that have occurred allow a cyberattack to be characterised in political terms and thus have value as information about ongoing conflicts in cyberspace that either reflect reality or foreshadow actions yet to come in the real world. Cyber operations can also be used as a tool to build a sphere of influence and exert political, economic and military pressure on a particular state.","PeriodicalId":37403,"journal":{"name":"Politics in Central Europe","volume":"18 1","pages":"317 - 342"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Politics in Central Europe","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2478/pce-2022-0014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract The article deals with cyber incidents that were recorded in the area of the V4 countries. It is important for the discussed topic to extract certain factors and with their help to characterise the conducted cyberattacks in terms of political motivations. The analysis tries to prove the existence of politically motivated cyberattacks. This, in turn, helps to determine the consequences of such cyber incidents. Moreover, the scale and magnitude of the cyberattack can be information to determine the strategic maturity and cyber capabilities of the adversary. Thus, the incidents that have occurred allow a cyberattack to be characterised in political terms and thus have value as information about ongoing conflicts in cyberspace that either reflect reality or foreshadow actions yet to come in the real world. Cyber operations can also be used as a tool to build a sphere of influence and exert political, economic and military pressure on a particular state.
期刊介绍:
POLITICS IN CENTRAL EUROPE – The Journal of the Central European Political Science Association is an independent and internationally peer-reviewed scientific journal in political science and international relations. The Journal was established in 2005 as the scientific review that publishes scientific essays, book reviews and information about conferences and other events connected with Central European issues. POLITICS IN CENTRAL EUROPE publishes politics, policy analysis, international relations and other sub-disciplines of political original, peer-reviewed manuscripts that provide scientific essays focusing on issues in comparative science, as well as original theoretical or conceptual analyses. All essays must contribute to a broad understanding of the region of Central Europe. Our goal is to give scholars from Central Europe and beyond the opportunity to present the results of their research.