Сyberwar as a systemic challenge to Ukraine's cybersecurity

Authors

  • Viktor Horlynskyi Institute of special communications and information protection, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine https://orcid.org/0000-0003-1190-5991
  • Borys Horlynskyi State scientific and research institute of cybersecurity technologies and information protection, Kyiv, Ukraine https://orcid.org/0000-0002-9993-2427

DOI:

https://doi.org/10.20535/2411-1031.2025.13.1.328980

Keywords:

cybersecurity, cyberwar, cyberdefense, cyberweapons, cyberspace, cyberpotential, cyberforces

Abstract

Based on the analysis of scientific sources and generalization of knowledge about the confrontation in global cyberspace, the basic characteristics of cyberwar have been identified, namely: the parties to cyberwar can be states, coalitions or other subjects of international relations; the main targets in cyberwar are state strategic and military facilities, financial institutions, and the country's critical infrastructure; the main means of cyberwar is the complex, coordinated in time and space, use of various types of cyberweapons; the basic form of using cyberweapons as an element of a cyberoperation is a cyberattack; the involvement of cyber troops and cyber units in preventive cyberoperations; the organization of preventive cyberdefense as a counteraction to the destructive impact on cyberspace in the forms of cyberespionage, cybersabotage, cyberterrorism, and cybercrime. The proposed understanding of the essence of cyberwar as a way of resolving geopolitical and socioeconomic contradictions between subjects of international relations with the complex use of cyberweapons and other forms of destructive influence on cyberspace is revealed. The substantive side of cyberwar, which is determined by the composition and functions of the structural components of the organization of preventive active counteraction in cyberwar, is revealed. The factors of the functioning of the national segment of cyberspace in the conditions of cyberwar are substantiated, namely: − the presence of cyber potential for confrontation in cyberspace, deterrence of cybercrime, cyberterrorism and other cyberthreats; − effective cyber defense based on the use of cyber units with the authority to conduct confrontation in cyberspace and effective interaction of the main subjects of the national cybersecurity system and defense forces; − cyber resilience, security and cyber readiness of national critical infrastructure; − national cyber sovereignty – legal security of the established functioning of cyberspace on national and international legal principles; − the presence of the state's professional and educational potential – ensuring the personnel needs of cyber troops with cybersecurity specialists.

Author Biographies

Viktor Horlynskyi, Institute of special communications and information protection, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv

candidate of philosophical sciences (Ph.D), associate professor, a leading researcher of the Scientific Research Center

Borys Horlynskyi, State scientific and research institute of cybersecurity technologies and information protection, Kyiv

candidate of technical sciences, deputy head

References

Verkhovna Rada of Ukraine. (2017, Oct. 5). Law no. 2163-VIII. About the Basic Principles of Cyber Security of Ukraine. [Online]. Available: http://zakon.rada.gov.ua/laws/show/. Accessed on: Jan. 10, 2025.

President of Ukraine. (2021, May 14). Decree № 447/2021, On the Decision of the National Security and Defense Council of Ukraine “On the Cyber Security Strategy of Ukraine”. [Online]. Available: https://www.president.gov.ua/documents/4472021-40013. Accessed on: Jan. 10, 2023.

O. Potii, “Cybersecurity remains a crucial battleground, just like other domains”, SSSCIP. News. [Online]. Available: https://cip.gov.ua/en/news/oleksandr-potii-kiberbezpekazalishayetsya-takoyu-samoyu-arenoyu-boiovikh-dii-yak-i-inshi-domeni. Accessed on: Jan. 10, 2025.

NSDC of Ukraine. (2025, Jan. 09). Annual Analytical Review: Key Events, Trends, and Challenges in Cybersecurity in 2024. [Online]. Available: https://www.rnbo.gov.ua/ua/Diialnist/7095.html. Accessed on: Jan. 10, 2025.

J. Arcvilly, and D. Rothfeldt, “Cyberwar is Coming”, In Athena’s Camp: Preparing for Conflict in the Information Age, RAND/MR-880-OSD/RC, 1997. [Online]. Available: https://www.rand.org/pubs/reprints/RP223.html. Accessed on: Jan. 10, 2025.

M. Libicki, “Cyber Deterrence and Cyber Warfare”, RAND Corporation, 2009. [Online]. Available: https://www.rand.org/pubs/monographs/MG877.html#document-details. Accessed on: Jan. 10, 2025.

R. Clarke, and R. Knake, Cyber War: The Next Threat to National Security and What to Do. Glasgow, UK: Harper Collins, 2010. [Online]. Available: https://books.google.com.ua/books/about/Cyber_War.html?id=rNRlR4RGkecC&redir_esc=y. Accessed on: Jan. 10, 2025.

J. Carr, Inside Cyber Warfare, Sebastopol, CA, USA: O'Reilly Media, Inc., 2012. [Online]. Available: https://books.google.com.ua/books/about/Inside_Cyber_Warfare.html?id=nFP9wrNmGhcC&redir_esc=y. Accessed on: Jan. 10, 2025.

E. Filiol, “Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct”, in Cyberwar and Information Warfare, D. Ventre, Ed. London, UK: Wiley Online Library, pp. 245-284, 2013, doi: https://doi.org/10.1002/9781118603482.ch5.

B. Raboin, “Corresponding Evolution: International Law and the Emergence of Cyber Warfare”, Journal of the National Association of Administrative Law Judiciary, pp. 81-99, 2011. [Online]. Available: https://digitalcommons.pepperdine.edu/naalj/vol31/iss2/5. Accessed on: Jan. 10, 2025.

O. Buxton, “Cyber Warfare: Types, Examples, and How to Stay Safe”, Academy, 2023. [Online]. Available: https://www.avast.com/c-cyber-warfare. Accessed on: Jan. 10, 2025.

Y. Kohut, “Cyberwarfare and the Security of Critical Infrastructure Facilities”, Kyiv, Ukraine: Sidcon, 2024. [Online]. Available: https://nashformat.ua/products/ebook-kibervijna-tabezpeka-ob-ektiv-krytychnoi-infrastruktury-629032?srsltid=AfmBOor0cXRP2XUE4VrxwfkTvPik5wBBsMQxUkOhI_njh9RS1zUjUw9c. Accessed on: Jan. 10, 2025.

M. Buchyn, and Y. Kurus, “Information war and its particularities at the contemporary stage”, Humanitarian visions, vol. 4, iss. 2, pp. 1-6, 2018, doi: https://doi.org/10.23939/shv2018.02.001.

V. Horlynskyi, and B. Horlynskyi, “Сonstitution of national cyber space and its educational significance for cyber security professionals”, Information Technology and Security, vol. 11, iss. 1, pp. 69-83, 2023, doi: https://doi.org/10.20535/2411-1031.2023.11.1.283710.

United Nations, (2018, Dec. 22). Resolution adopted by the General Assembly 73/266 “Advancing responsible State behaviour in cyberspace in the context of international security”. [Online]. Available: https://ccdcoe.org/uploads/2019/10/UN-190102-GA-ResolutionA_RES_73_266.pdf. Accessed on: Jan. 10, 2025.

“Cyber Warfare”, ICRC. [Online]. Available: https://casebook.icrc.org/highlight/cyberwarfare. Accessed on: Feb. 26, 2025.

ICRC. (2019, Nov. 28). ICRC position paper. “International Humanitarian Law and Cyber Operations during Armed Conflicts”. [Online]. Available: https://www.icrc.org/en/download/file/108983/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf. Accessed on: Jan. 10, 2025.

European Treaty Series. (2001, Nov. 23). “Convention on Cybercrime”. Budapest, no. 185. [Online]. Available: https://rm.coe.int/1680080f0b. Accessed on: Jan. 10, 2025.

M. Kamchatniy, “The main features of the concept of cyberwar in contemporary international law”, Almanac of International Law, vol. 15, pp. 12-22, 2017. [Online]. Available: http://nbuv.gov.ua/UJRN/amp_2017_15_4. Accessed on: Jan. 10, 2025.

President of Ukraine. (2021, Aug. 26). Decree № 446/2021, On the Decision of the National Security and Defense Council of Ukraine “On urgent measures for the state's cyber defense”. [Online]. Available: https://www.president.gov.ua/documents/4462021-40009. Accessed on: Jan. 10, 2025.

Yu. Razmietaieva, “Cyberwar: General Theoretical Aspects”, Bulletin of the Academy of the Customs Service of Ukraine. Series: Law, no. 1, pp. 12-22, 2015. [Online]. Available: http://nbuv.gov.ua/UJRN/vamsup_2015_1_4. Accessed on: Jan. 15, 2025.

M. Yatsyshyn, “Use of force in cyberspace within the framework of international law”, Information and law, no. 4 (27), pp. 22-32, 2018. [Online]. Available: https://www.researchgate.net/publication/332849607_Vikoristanna_sili_u_kiberprostori_v_ramkah_miznarodnogo_prava. Accessed on: Jan. 22, 2025.

Yu. Zavhorodnya, “The history of the formation of cyber war as a component of the political process”, Current issues of politics, iss. 72, pp. 42-46, 2023. doi: https://doi.org/10.32782/app.v72.2023.6.

United States. Department of State. (2024, May 6). United States International Cyberspace & Digital Policy Strategy, U.S. Department of State, An official website of the United States Government. [Online]. Available: https://www.state.gov/united-states-internationalcyberspace-and-digital-policy-strategy. Accessed on: Jan. 10, 2025.

D. Dubov, Cyberspace as a new dimension of geopolitical rivalry: monograph. Kyiv, Ukraine: NSRI, 2014. [Online]. Available: https://shron1.chtyvo.org.ua/Dubov_Dmytro/Kiberprostir_iak_novyi_vymir_heopolitychnoho_supernytstva.pdf. Accessed on: Jan. 10, 2025.

“CERT-UA. (2025, Jan. 08). CERT-UA processed 4,315 cyber incidents last year”, St. Serv. of Spec. Com. and Inf. Prot. of Ukraine (SSSCIP). News. [Online]. Available: https://cip.gov.ua/en/news/cert-ua-minulogo-roku-opracyuvala-4315-kiberincidentiv. Accessed on: Jan. 10, 2025.

H. Bondar, “Cyber War in Ukraine and National Security Challenges: Cyber Attacks on Digital Infrastructure (Government Agencies, Critical Infrastructure and Third Sector Organizations)”, Public Administration and Regional Development, no. 1, pp. 30-67, 2022, doi: https://doi.org/10.34132/pard2022.15.02.

A. Bilyuga, “Cyberweapons: Modern Threats to National Security and Ways to Counteract”, Science and Defense, no. 2, pp. 42-49, 2021, doi: https://doi.org/10.33099/2618-1614-2021-152-42-49.

Y. Mikhieiev, M. Pavlenko, V. Loboda, and T. Voitko, “Requirements for advanced cyber weapons of the Armed Forces of Ukraine”, Systems and technologies of communication, informatization and cybersecurity, no. 6, pp. 146-152, 2024, doi: https://doi.org/10.58254/viti.6.2024.11.146.

N. Tkachuk, “US Experience in Creating and Developing Cyber Command: Lessons for Ukraine”, Information and Law, no. 1 (48), pp. 139-149, 2024. doi: https://doi.org/10.37750/2616-6798.2024.1(48).300798.

Ya. Manuilov, “Ensuring Cybersecurity of Critical Infrastructure Facilities in Cyberwar”, Information and Law, no. 1 (44), pp. 154-157, 2023. [Online]. Available: https://ippi.org.ua/sites/default/files/15_25.pdf. Accessed on: Jan. 10, 2025.

M. Kuleshov, “Critical infrastructure facilities as an object of ensuring cybersecurity in conditions of armed aggression”, Bulletin of the Penitentiary Association of Ukraine, no. 4 (22), pp. 50-58, 2022. doi: https://doi.org/10.34015/2523-4552.2022.4.05.

Verkhovna Rada of Ukraine. (2021, Nov. 16), Law no. 1882. About critical infrastructure. [Online]. Available: https://ips.ligazakon.net/document/T211882. Accessed on: Jan. 22, 2025.

Verkhovna Rada of Ukraine. (2022, Okt. 18), Law no. 2684-IX. On amendments to certain laws of Ukraine regarding the powers of the authorized body in the field of protection of critical infrastructure of Ukraine. [Online]. Available: https://zakon.rada.gov.ua/laws/show/268420#Text. Accessed on: Jan. 15, 2025.

O. Zvezdova, and A. Vakalyuk, “Cyber security strategy in hybrid war”, Acta De Historia & Politica: Saeculum XXI, no 3, pp. 82-90, 2022, doi: https://doi.org/10.26693/ahpsxxi20212022.03.082.

V. Horlynskyi, and B. Horlynskyi, “Educational priorities of training of cyber security specialists under the conditions of the state of martial state in the state”, Information Technology and Security, vol. 12, iss. 2 (23), pp. 268-282, 2024, doi: https://doi.org/10.20535/24111031.2024.12.2.31574.

Published

2025-05-20

How to Cite

Horlynskyi, V., & Horlynskyi, B. (2025). Сyberwar as a systemic challenge to Ukraine’s cybersecurity. Collection "Information Technology and Security", 13(1), 118–133. https://doi.org/10.20535/2411-1031.2025.13.1.328980

Issue

Section

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION