Cyber Protection as a Key Element of Repelling Armed Aggression in Cyberspace within the State Cyber Defense System

Keywords: Cyber Warfare, Cybersecurity, Cyber Protection, Cyber Influence, Cyberspace, Cyber Defense Information and Communication Systems, Armed Aggression in the Cyberspace Repelling, State Cyber Defense System

Abstract

Purpose. To substantiate the decisive role of cyber protection as a key element of repelling armed aggression in cyberspace and to determine its place within the state cyber defense system under conditions of contemporary hybrid threats.

Method. The study employs a systems approach, structural-functional analysis, conceptual modeling, as well as elements of comparative analysis of modern international cybersecurity frameworks.

Results. The study substantiates cyber protection as a system-forming element of state cyber defense, ensuring resilience, continuity, and controllability of information systems under persistent cyber aggression. A conceptual model linking cyber protection, adaptability, and cyber resilience is proposed.

Theoretical value. The research advances the conceptualization of cyber protection from a risk-management tool to a mechanism of repelling aggression, refining its role within cyber defense systems and extending existing theoretical approaches.

Practical value. The findings can support the development of cyber defense policies, resilience strategies, and protection of critical infrastructure, as well as integration into military planning.

Future research. Further studies should focus on quantitative indicators, model formalization, and empirical validation.

Article type. Theoretical.

Downloads

Download data is not yet available.

References

North Atlantic Treaty Organization. (2017). The Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.

National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity. U.S. Department of Commerce. URL: https://www.nist.gov

National Institute of Standards and Technology. (2020). Security and Privacy Controls for Information Systems and Organizations (NIST SP 800-53 Rev. 5). https://doi.org/10.6028/NIST.SP.800-53r5

European Union Agency for Cybersecurity. (2023). ENISA Threat Landscape 2023. URL: https://www.enisa.europa.eu

European Union Agency for Cybersecurity. (2021). Cybersecurity and Resilience of Critical Infrastructure. URL: https://www.enisa.europa.eu

International Telecommunication Union. (2020). Global Cybersecurity Index 2020. URL: https://www.itu.int

World Economic Forum. (2024). Global Cybersecurity Outlook 2024. https://www.weforum.org

United Nations Institute for Disarmament Research. (2021). Cyber Stability and International Security Report. URL: https://www.unidir.org

Microsoft. (2023). Microsoft Digital Defense Report 2023. URL: https://www.microsoft.com

IBM. (2023). Cost of a Data Breach Report 2023. URL: https://www.ibm.com

CrowdStrike. (2024). Global Threat Report 2024. URL: https://www.crowdstrike.com.

Verizon. (2023). Data Breach Investigations Report 2023. URL: https://www.verizon.com

FireEye. (2022). M-Trends 2022 Report. URL: https://www.mandiant.com

Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.

Rid, T. (2013). Cyber war will not take place. Oxford University Press.

Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND Corporation. URL: https://www.rand.org

International Organization for Standardization. (2022a). ISO/IEC 27001:2022 Information security management systems — Requirements.

International Organization for Standardization. (2022b). ISO/IEC 27002:2022 Information security controls.

North Atlantic Treaty Organization. (2022). Cyber Defence Pledge: Progress Report.

World Bank. (2022). Cybersecurity Capacity Review. URL: https://www.worldbank.org

Ukraine. (2021). Cybersecurity Strategy of Ukraine.

Ukraine. (2017). Law of Ukraine on the Basic Principles of Cybersecurity of Ukraine.

State Service of Special Communication and Information Protection of Ukraine. Official publications and analytical materials. URL: https://cip.gov.ua.

Security Service of Ukraine. Cybersecurity analytical materials. URL: https://ssu.gov.ua.


Abstract views: 1
PDF Downloads: 0
Published
2026-04-30
How to Cite
Semenenko, O., Rudnytskyi, V., Netrebko, R., Tkach, V., Shuhalii, O., & Karpenko, A. (2026). Cyber Protection as a Key Element of Repelling Armed Aggression in Cyberspace within the State Cyber Defense System. Social Development and Security, 16(2), 41-50. https://doi.org/10.33445/sds.2026.16.2.4
Section
National Security

Most read articles by the same author(s)

1 2 3 4 5 6 7 > >>