From self-affirmation to national security threat

This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their...

Full description

Bibliographic Details
Main Authors: Yuriy Yu. Nizovtsev, Andrii M. Lyseiuk, Mykhailo Kelman
Format: Article
Language:English
Published: Escuela Militar de Cadetes “General José María Córdova” 2022-04-01
Series:Revista Científica General José María Córdova
Subjects:
Online Access:https://revistacientificaesmic.com/index.php/esmic/article/view/905
_version_ 1828465442391326720
author Yuriy Yu. Nizovtsev
Andrii M. Lyseiuk
Mykhailo Kelman
author_facet Yuriy Yu. Nizovtsev
Andrii M. Lyseiuk
Mykhailo Kelman
author_sort Yuriy Yu. Nizovtsev
collection DOAJ
description This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon the main characteristic features of the current state of the cyber environment.
first_indexed 2024-12-11T03:33:07Z
format Article
id doaj.art-bddc94a045d84860849e78207aa4e147
institution Directory Open Access Journal
issn 1900-6586
2500-7645
language English
last_indexed 2024-12-11T03:33:07Z
publishDate 2022-04-01
publisher Escuela Militar de Cadetes “General José María Córdova”
record_format Article
series Revista Científica General José María Córdova
spelling doaj.art-bddc94a045d84860849e78207aa4e1472022-12-22T01:22:20ZengEscuela Militar de Cadetes “General José María Córdova”Revista Científica General José María Córdova1900-65862500-76452022-04-01203810.21830/19006586.905From self-affirmation to national security threatYuriy Yu. Nizovtsev0Andrii M. Lyseiuk1Mykhailo Kelman2Ukrainian Scientific and Research Institute of Special Equipment and Forensic Expertise of the Security Service of Ukraine, UkraineUkrainian Scientific and Research Institute of Special Equipment and Forensic Expertise of the Security Service of Ukraine, UkraineNational University, Ukraine This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars. The authors use empirical qualitative and quantitative research methods to assess the stages of cyberattack development, considering their increasing numbers, diversity, and the creation of the malware employed. The paper provides a better understanding of the causes, conditions, and consequences of the emerging types of cyberattacks. The article concludes by pointing out the three stages in the evolution of cyberattacks and draws upon the main characteristic features of the current state of the cyber environment. https://revistacientificaesmic.com/index.php/esmic/article/view/905critical infrastructurecybercrimecyber espionagecyber terrorismhacker groupsmalware
spellingShingle Yuriy Yu. Nizovtsev
Andrii M. Lyseiuk
Mykhailo Kelman
From self-affirmation to national security threat
Revista Científica General José María Córdova
critical infrastructure
cybercrime
cyber espionage
cyber terrorism
hacker groups
malware
title From self-affirmation to national security threat
title_full From self-affirmation to national security threat
title_fullStr From self-affirmation to national security threat
title_full_unstemmed From self-affirmation to national security threat
title_short From self-affirmation to national security threat
title_sort from self affirmation to national security threat
topic critical infrastructure
cybercrime
cyber espionage
cyber terrorism
hacker groups
malware
url https://revistacientificaesmic.com/index.php/esmic/article/view/905
work_keys_str_mv AT yuriyyunizovtsev fromselfaffirmationtonationalsecuritythreat
AT andriimlyseiuk fromselfaffirmationtonationalsecuritythreat
AT mykhailokelman fromselfaffirmationtonationalsecuritythreat