Prevent and Reduce the Risk of Implementing the Main Cybersecurity Threats


  • Yuriy Danyk
  • Serhii Vdovenko
  • Serhii Voloshko



cognitive warfare, cyber challenges and threats, cyber defense, cyber security, cyber space, hybrid threats, national cyber defense system, system of cyber threats early detection


In hybrid conflicts of any intensity, hostilities (operations) are an element of other (non-force) actions mutually coordinated according to a single plan, mainly economic, political, diplomatic, informational, psychological, cyber, cognitive, etc. This creates destabilizing internal and external processes in the state that is the object of aggression (concern and discontent of the population, migration, acts of civil disobedience, etc.). The article examines the effective organizational and technical countermeasures against hybrid threats, national cyber defense systems in the developed countries. The article also presents the results of the investigations into the effects of the information hybrid threats through cyberspace on social, technical, socio and technical systems. The composition of the system of early efficient detection of the above hybrids is proposed. The results of the structural and parametric synthesis of the system are described. The recommendations related to the system implementation are given. A number of sufficient components for the effective design and development of the national cyber defense system of the state are proposed.


F. Hoffman, “Hybrid Warfare and Challenges,” Joint Forces Quarterly, issue 52, pp. 34-39, 2009.

H. Gunneriusson, “Hybrid warfare: Development, historical context, challenges and interpretations,” Icono 14, vol. 19, issue 1, pp. 15-37, 2021. DOI: ri14.v19i1.160

B. Boyer, “Countering hybrid threats in cyberspace,” Cyber Defense Review, vol. 2, ed. 3, 2015.

N. Iancu, A. Fortuna, C. Barna, Countering Hybrid Threats: Lessons Learned from Ukraine, IOS Press BV, Amsterdam, 2016, 286 p.

S. Harris, Cyberwar @: The Fifth Theater of War, 2014.

J. Suler, “The online disinhibition effect,” Cyber Psychology and Behavior, vol. 7, issue 3, 321-326, 2004.

Cyber War: The Next Threat to National Security and What to Do About It by Richard A. Clarke –, 2010.

P. Eronen, Russian Hybrid Warfare: How to Confront a New Challenge to the West, FDD PRESS, 2016, 27 p.

B. Renz and H. Smith, Russia and Hybrid Warfare – Going Beyond the Label. [Online]. Available at:

Cyberspace Threats and Vulnerabilities. [Online]. Available at:

P. Cornish, R. Hughes, and D. Livingstone, Cybers Pace and the National Security of the United Kingdom. Threats and Responses, A Chatham House Report, March 2009.

What is Cyber Threat Intelligence, and why you Need It, 2017 [Online]. Available at:

M. Mateski, C. Trevino, and C. Veitch, et al. Cyber Threat Metrics. Sandia National Laboratories Report, March 2012.

J. Andress, S. Winterfeld, R. Rogers, Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, Amsterdam: Syngress/Elsevier, 2011, 289 p.

I. R. Porche III, C. Paul, M. York, et al., Redefining Information Warfare Boundaries for an Army in a Wireless World. [Online]. Available at:

Putin’s asymmetric assault on democracy in Russia and Europe: implications for U.S. National security a minority staff report prepared for the use of the committee on foreign relations United States Senate one hundred fifteenth congress second session January 10, 2018. [Online]. Available at:

Information operation against Ukraine Armed Forces officials “If not the Generals…,”,,

Yu. Danyk, O. Pisarchuk, “Method of structural parametric synthesis of complex ergatic distributed informational-controlling system of response on conflict situation,” Journal of Automation and Information Sciences, Begell Hours, inc publishers, USA, vol. 46, issue 3, pp. 47–69, 2014.

Yu. Danyk, T. Maliarchuk, Ch. Briggs, “Hybrid war: High-tech, information and cyber conflicts, connections,” The Quarterly Journal, vol. 16, no. 2, pp. 524, 2017. URL:

E. Stoycheff, E. C. Nisbet, “Priming the costs of conflict? Russian public opinion about the 2014 Crimean conflict,” International Journal of Public Opinion Research, vol. 29, issue 4, edw020, 2016.

P. Duggan, “Strategic development of special warfare in cyberspace,” Joint Force Quarterly, vol. 79, pp. 46-53, 2015.




How to Cite

Danyk, Y., Vdovenko, S., & Voloshko, S. (2022). Prevent and Reduce the Risk of Implementing the Main Cybersecurity Threats. International Journal of Computing, 21(1), 32-41.