The Essence of High-Tech Warfare in the Organizational and Institutional Security Theory of State Administration

Keywords: information networks, information technology, cyber security, cyberspace, artificial intelligence, unified network, communication system and communication system

Abstract

At the turn of the 20th and 21st centuries, fundamental changes occurred in the field of international security. The world community faced fundamentally new challenges and threats. In many regions of the world, interstate rivalry was observed, which led to the outbreak of local wars and military conflicts, which mostly took the form of armed confrontation.

Technological progress, the presence of significant military power, the demonstration of determination and its use transformed social relations into more conflictual ones. Gradually, more and more countries of the world are involved in local wars and military conflicts. In this context, it should be noted that the intensity and scale of hostilities during the last thirty years, which took place in different corners of the globe, testify to the growth of dynamic changes in the situation in the combat zone during the use of international coalition forces. At the same time, the strict implementation of the requirements for stable, continuous, operational and covert management of troops during their performance of combat missions prompts the world's leading countries to develop and implement new concepts of information networks and systems.

It should be noted that future wars will depend on high-tech intelligence. The priority is to identify the enemy first, before he notices you; blind the enemy's sensors, be it drones or satellites; and disrupt their means and data channels, whether through cyberattacks, electronic warfare, or old-fashioned firepower. Armies will have to develop new forms and methods of application, relying on mobility, dispersion, camouflage and deception measures. Large armies that fail to invest in new technology or develop new doctrine will be overwhelmed by smaller ones that do. "We have to recognize that the old concepts of fighting large tank battles on European land are over," said Boris Johnson, the UK's prime minister, in November 2021. "There are other, more important things in which we should invest. Cyber technologies, this will be the war of the future." Three months later, Russia invaded Ukraine.

So, the work defines the problem of incomplete compliance of the current state and readiness of the security and defense sector with regard to the requirements of effective countermeasures against threats to national security and their neutralization, the task of improving this activity, regarding the creation of unified management and communication systems, and horizontal connections are defined connections of these systems and electronic communication networks, which in the future will undoubtedly affect the safe functioning of the national segment of cyberspace.

Downloads

Download data is not yet available.

Author Biography

Yevhen Zhyvylo, V. N. Karazin Kharkiv National University, 4 Svobody Sq, Kharkiv, 61022, Ukraine

doctoral candidate of the Department of Economic Policy and Management, Educational and Scientific Institute «Institute of Public Administration», V. N. Karazin Kharkiv National University, 4 Svobody Sq., Kharkiv, 61022, Ukraine

References

The war in Ukraine shows how technology is changing the battlefield - The Economist, 2023-07-05, https://texty.org.ua/fragments/110086/vijna-v-ukrayini-pokazuye-yak-tehnolohiyi-zminyuyut-pole-boyu-the-economist/;

Zhyvylo Y. O., Orlov O. V. The essence of cyber security of the national segment of the state's cyberspace in the context of crisis management // Collection of scientific materials of the 22nd International Scientific Congress "Public administration of the 21st century in the context of hybrid threats" April 27, 2022 - K. : Kharkiv National University named after Vasyl Nazarovych Karazin, 2022. – P. 248-254;

Zhyvylo Y. O., Shevchenko D. G. Assessment of cyber security risks and privacy control in information systems of state administration // Scientific journal "Collection of Scientific Works of the Military Institute of Taras Shevchenko Kyiv National University" K.: Military Institute of Kyiv National University named after Taras Shevchenko, - 2022. - No. 75. – pp. 66-76;

Decree of the Cabinet of Ministers of Ukraine dated March 10, 2017 No.155-r. "On the approval of the plan of measures for the year 2017 for the implementation of the Cybersecurity Strategy of Ukraine" [Electronic resource]. – Access mode: URL: https://zakon.rada.gov.ua/laws/show/155-2017-%D1%80#Text;

Decree of the Cabinet of Ministers of Ukraine dated November 11, 2020 No.1176 "On approval of the Procedure for conducting a review of the state of cyber protection of critical information infrastructure, state information resources and information, the requirement for the protection of which is established by law" [Electronic resource]. – Access mode: URL: https://zakon.rada.gov.ua/laws/show/1176-2020-%D0%BF#Text;

Law of Ukraine "On Critical Infrastructure" (document 1882-IX, dated November 16, 2021) [Electronic resource]. – Access mode: URL: https://zakon.rada.gov.ua/laws/show/1882-20#Text;

Decree of the President of Ukraine No. 96/2016 ed. dated August 28, 2021 On the decision of the National Security and Defense Council of Ukraine dated January 27, 2016 "On the Cyber Security Strategy of Ukraine" [Electronic resource]. – Access mode: URL: https://www.rnbo.gov.ua/ua/Ukazy/417.html;

Decree of the President of Ukraine dated September 17, 2021 No. 473/2021 "Strategic Defense Bulletin of Ukraine" [Electronic resource]. – Access mode: https://zakonodavstvo.com/laws/file/text/93/f509164n72.docx;

Assessing Security and Privacy Controls in Information Systems and Organizations, August 2021, https://csrc.nist.gov/pubs/sp/800/53/a/r5/ipd;

Koval M., Sova O., Orlov O., Zhyvylo Y., Zhyvylo I. Improvement of complex resource management of special-purpose communication systems // 5(9-119) (2022): Eastern-European Journal of Enterprise Technologies. Р. 34–44;

Special Publication 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS) // https://csrc.nist.gov/pubs/sp/800/94/final;

Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight, September 2022, https://csrc.nist.gov/pubs/ir/8286/c/final;

Svitlana Onyshchenko, Yevhen Zhyvylo, Anna Cherviak, Stanislav Bilko Determining the patterns of using information protection systems at financial institutions in order to improve the level of financial security // Vol. 5 (13 (125)) (2023): Eastern-European Journal of Enterprise Technologies. P. 65–76;

The Economist: А new era of high-tech warfare began in Ukraine 07 July, 2023, https://zn.ua/ukr/WORLD/the-economist-v-ukrajini-pochalasja-nova-era-visokotekhnolohichnikh-vijn.html;

Yevhen Zhyvylo, Vladyslav Kuz Risk Management of Critical Information Infrastructure:Threats-Vulnerabilities-Consequences // Vol. 5 No. 2 (2023): Theoretical and Applied Cyber Security. P. 68–80;

Published
2023-12-30
Section
Theory and Philosophy of Public Administration