From self-affirmation to national security threat
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Escuela Militar de Cadetes “General José María Córdova”
2022-04-01
|
Series: | Revista Científica General José María Córdova |
Subjects: | |
Online Access: | https://revistacientificaesmic.com/index.php/esmic/article/view/905 |
_version_ | 1828465442391326720 |
---|---|
author | Yuriy Yu. Nizovtsev Andrii M. Lyseiuk Mykhailo Kelman |
author_facet | Yuriy Yu. Nizovtsev Andrii M. Lyseiuk Mykhailo Kelman |
author_sort | Yuriy Yu. Nizovtsev |
collection | DOAJ |
description |
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon the main characteristic features of the current state of the cyber environment.
|
first_indexed | 2024-12-11T03:33:07Z |
format | Article |
id | doaj.art-bddc94a045d84860849e78207aa4e147 |
institution | Directory Open Access Journal |
issn | 1900-6586 2500-7645 |
language | English |
last_indexed | 2024-12-11T03:33:07Z |
publishDate | 2022-04-01 |
publisher | Escuela Militar de Cadetes “General José María Córdova” |
record_format | Article |
series | Revista Científica General José María Córdova |
spelling | doaj.art-bddc94a045d84860849e78207aa4e1472022-12-22T01:22:20ZengEscuela Militar de Cadetes “General José María Córdova”Revista Científica General José María Córdova1900-65862500-76452022-04-01203810.21830/19006586.905From self-affirmation to national security threatYuriy Yu. Nizovtsev0Andrii M. Lyseiuk1Mykhailo Kelman2Ukrainian Scientific and Research Institute of Special Equipment and Forensic Expertise of the Security Service of Ukraine, UkraineUkrainian Scientific and Research Institute of Special Equipment and Forensic Expertise of the Security Service of Ukraine, UkraineNational University, Ukraine This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon the main characteristic features of the current state of the cyber environment. https://revistacientificaesmic.com/index.php/esmic/article/view/905critical infrastructurecybercrimecyber espionagecyber terrorismhacker groupsmalware |
spellingShingle | Yuriy Yu. Nizovtsev Andrii M. Lyseiuk Mykhailo Kelman From self-affirmation to national security threat Revista Científica General José María Córdova critical infrastructure cybercrime cyber espionage cyber terrorism hacker groups malware |
title | From self-affirmation to national security threat |
title_full | From self-affirmation to national security threat |
title_fullStr | From self-affirmation to national security threat |
title_full_unstemmed | From self-affirmation to national security threat |
title_short | From self-affirmation to national security threat |
title_sort | from self affirmation to national security threat |
topic | critical infrastructure cybercrime cyber espionage cyber terrorism hacker groups malware |
url | https://revistacientificaesmic.com/index.php/esmic/article/view/905 |
work_keys_str_mv | AT yuriyyunizovtsev fromselfaffirmationtonationalsecuritythreat AT andriimlyseiuk fromselfaffirmationtonationalsecuritythreat AT mykhailokelman fromselfaffirmationtonationalsecuritythreat |