Cyber Protection as a Key Element of Repelling Armed Aggression in Cyberspace within the State Cyber Defense System
Abstract
Purpose. To substantiate the decisive role of cyber protection as a key element of repelling armed aggression in cyberspace and to determine its place within the state cyber defense system under conditions of contemporary hybrid threats.
Method. The study employs a systems approach, structural-functional analysis, conceptual modeling, as well as elements of comparative analysis of modern international cybersecurity frameworks.
Results. The study substantiates cyber protection as a system-forming element of state cyber defense, ensuring resilience, continuity, and controllability of information systems under persistent cyber aggression. A conceptual model linking cyber protection, adaptability, and cyber resilience is proposed.
Theoretical value. The research advances the conceptualization of cyber protection from a risk-management tool to a mechanism of repelling aggression, refining its role within cyber defense systems and extending existing theoretical approaches.
Practical value. The findings can support the development of cyber defense policies, resilience strategies, and protection of critical infrastructure, as well as integration into military planning.
Future research. Further studies should focus on quantitative indicators, model formalization, and empirical validation.
Article type. Theoretical.
Downloads
References
North Atlantic Treaty Organization. (2017). The Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.
National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity. U.S. Department of Commerce. URL: https://www.nist.gov
National Institute of Standards and Technology. (2020). Security and Privacy Controls for Information Systems and Organizations (NIST SP 800-53 Rev. 5). https://doi.org/10.6028/NIST.SP.800-53r5
European Union Agency for Cybersecurity. (2023). ENISA Threat Landscape 2023. URL: https://www.enisa.europa.eu
European Union Agency for Cybersecurity. (2021). Cybersecurity and Resilience of Critical Infrastructure. URL: https://www.enisa.europa.eu
International Telecommunication Union. (2020). Global Cybersecurity Index 2020. URL: https://www.itu.int
World Economic Forum. (2024). Global Cybersecurity Outlook 2024. https://www.weforum.org
United Nations Institute for Disarmament Research. (2021). Cyber Stability and International Security Report. URL: https://www.unidir.org
Microsoft. (2023). Microsoft Digital Defense Report 2023. URL: https://www.microsoft.com
IBM. (2023). Cost of a Data Breach Report 2023. URL: https://www.ibm.com
CrowdStrike. (2024). Global Threat Report 2024. URL: https://www.crowdstrike.com.
Verizon. (2023). Data Breach Investigations Report 2023. URL: https://www.verizon.com
FireEye. (2022). M-Trends 2022 Report. URL: https://www.mandiant.com
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
Rid, T. (2013). Cyber war will not take place. Oxford University Press.
Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND Corporation. URL: https://www.rand.org
International Organization for Standardization. (2022a). ISO/IEC 27001:2022 Information security management systems — Requirements.
International Organization for Standardization. (2022b). ISO/IEC 27002:2022 Information security controls.
North Atlantic Treaty Organization. (2022). Cyber Defence Pledge: Progress Report.
World Bank. (2022). Cybersecurity Capacity Review. URL: https://www.worldbank.org
Ukraine. (2021). Cybersecurity Strategy of Ukraine.
Ukraine. (2017). Law of Ukraine on the Basic Principles of Cybersecurity of Ukraine.
State Service of Special Communication and Information Protection of Ukraine. Official publications and analytical materials. URL: https://cip.gov.ua.
Security Service of Ukraine. Cybersecurity analytical materials. URL: https://ssu.gov.ua.
Abstract views: 1 PDF Downloads: 0
Copyright (c) 2026 Oleh Semenenko, Volodymyr Rudnytskyi, Ruslan Netrebko, Volodymyr Tkach, Olha Shuhalii, Andrii Karpenko

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).










