Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Hybrid operations using cyberspace in the Russian-Ukrainian conflikt

Authors

[ 1 ] Wydział Wojskowy, Akademia Sztuki Wojennej | [ 2 ] "Vasil Levski" National Military University, Veliko Tarnovo, Bulgaria | [ P ] employee

Scientific discipline (Law 2.0)

[6.3] Security studies

Year of publication

2024

Chapter type

chapter in monograph

Publication language

english

Keywords
PL
  • Agresja rosyjska na Ukrainę (2022)
  • Wojna rosyjsko-ukraińska (2014- )
  • Cyberprzestrzeń
  • Wojna hybrydowa
Abstract

EN Although hybrid actions are not a phenomenon that can only be attributed to contemporary conflicts, not only armed ones, their full spectrum can be analyzed from February 2022, i.e. from the beginning of the Russian-Ukrainian armed conflict. Preliminary analyzes demonstrate the fact that cyber-attacks on Ukraine's digital infrastructure were only partially effective despite the massive involvement of hacktivists and cybercriminal groups acting on behalf of Russian national interests. However, in the literature one can find statements that the success of cyber defense resulted from the effective use of the national cyber security strategy310, but above all from the support of allies for Ukraine. Kinetic attacks on data storage places forced us to take actions aimed at migrating data and applications to cloud computing. As a result, the use of cloud solutions turned out to be necessary to achieve the security of ICT systems. This study aims to describe the ways of using cyberspace in hybrid activities, based on the example of cyber operations conducted by the parties to the Russian-Ukrainian conflict. To identify the indicated research areas, analysis and criticism of the literature and analysis of data taken from media reports regarding the destructive impact of the parties to the conflict on elements of cyberspace were used.

Date of online publication

28.11.2024

Pages (from - to)

181 - 194

Comments

Bibliografia, netografia na stronach 190-191.

Book

Teoretyczne i praktyczne aspekty bezpieczeństwa. T. 2, Ewolucja zarządzania kryzysowego w kierunku współczesnych wyzwań i zagrożeń

Ministry points / chapter

5

Ministry points / chapter (humanities, social sciences and theology)

5