«РОЛЬ ГОСУДАРСТВЕННЫХ ОРГАНОВ В ПРОТИВОДЕЙСТВИИ КИБЕРУГРОЗАМ И ГИБРИДНЫМ АТАКАМ» / “THE ROLE OF GOVERNMENT AGENCIES IN COMBATING CYBER-THREATS AND HYBRID ATTACKS.”

Authors

  • Комилов Мехриддин Маликович Курсант 2 курса военного факультета Б.Г.П.И. Author

Abstract

Тема / Title

  • Роль государственных органов в противодействии киберугрозам и гибридным атакам
  • The Role of Government Agencies in Combating Cyber Threats and Hybrid Attacks

References

1. Arbhi … Dimaz Cahya Ardhi, Dwi Puspita Sari, Benjamin Yankson, “Cyberattacks in government organizations: A systematic literature review of attack types and mitigation strategies.” Conference on Digital Government Research, 2025. (proceedings.open.tudelft.nl)

2. Tsaruk O., Korniiets M., “Hybrid nature of modern threats for cybersecurity and information security.” SCRD, 2023. (scrd.eu)

3. Beretas C., “Cyber Hybrid Warfare: Asymmetric Threat.” Research & Development in Material Science, 2020. (crimsonpublishers)

4. McKinsey & Company, “Follow the leaders: How governments can combat intensifying cybersecurity risks.” 2022. (McKinsey & Company)

5. “The role of government and law enforcement agencies in combating cybercrime.” Scriptonet. (Scriptonet Analytics)

6. Shostack A., Dykstra J., “Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19.” 2024. (arXiv)

7. Schmitt M., Koutroumpis P., “Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures.” 2025. (arXiv)

8. Information (MDPI), “Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era.” 2024. (MDPI)

9. MDPI, “Data Governance to Counter Hybrid Threats against Critical Infrastructures.” 2023. (MDPI)

10. International Journal of Advance Research, Ideas and Innovations in Technology, “Cyber security and government: safeguarding the public sectors in the digital era.” Smith O.Y., 2024. (IJARIIT)

11. International Journal of Computer Applications Technology and Research, “Roles and responsibilities in cybersecurity incident response.” 2025. (Ijcat)

Downloads

Published

2025-10-30