Cyber Threats in Hybrid Warfare: A Strategic Mapping and Response Framework for National Defense
DOI:
https://doi.org/10.52690/jswse.v7i3.1556Keywords:
Cyber Threats and Cybersecurity, Hybrid Warfare, National Defense, Strategic ResponseAbstract
Hybrid warfare integrates military and non-military instruments, with cyberspace emerging as a critical domain. Cyber threats in this context are systemic, multidimensional, and difficult to attribute, yet existing studies often treat cybersecurity and hybrid warfare separately. This study maps cyber threats within hybrid warfare frameworks and formulates strategic responses to support national defense. A qualitative descriptive approach was used, combining systematic literature review (45 peer-reviewed articles and policy documents, 2018–2025), Soft System Methodology (SSM) for complexity analysis, and SWOT analysis for strategic formulation. Four principal cyber threat types were identified: attacks on critical infrastructure, cyber espionage, disinformation campaigns, and influence operations. Key characteristics include multidimensionality, attribution difficulty, asymmetry, and involvement of both state and non-state actors. SSM revealed interconnected systems across technology, governance, and society. SWOT analysis identified strengths (growing digital human resources) and weaknesses (limited inter-agency coordination). A strategic response model comprising system integration, capacity enhancement, and national coordination is proposed. National defense systems must adopt holistic, adaptive frameworks that integrate cyber capabilities, cross-sectoral collaboration, and societal resilience. Future research should empirically test the proposed model in national defense contexts.
References
Balan, S., Balan, L., Vorotynskyy, V., Rybak, I., & Tarasiuk, V. (2025). State Information Policy in The Context of Hybrid Threats: Legal and Political Aspects. Social And Legal Studios, 8(1). https://doi.org/10.32518/Sals1.2025.165
Bila, А. V. (2024). Modern Problematic Aspects of Forensics in The Context of Martial Law in Ukraine and Global ThreATS. Alfred Nobel University Journal of Law, 2(9). https://doi.org/10.32342/3041-2218-2024-2-9-10
Dr. Muhammad Hatim, Dr. Adeel Irfan, Elahi Umar Ranjha, Haroon Shah, & Muhammad Ahmad. (2025). Hybrid Conflict in the 21st Century: Pakistan’s Security Dilemmas and Responses. Social Science Review Archives, 3(2). https://doi.org/10.70670/Sra.V3i2.684
Farrand, B., Carrapico, H., & Turobov, A. (2024). The New Geopolitics of EU Cybersecurity: Security, Economy and Sovereignty. International Affairs, 100(6). https://doi.org/10.1093/Ia/Iiae231
Hulak, N., Ilyenko, A., & Dubchak, O. (2025). Practical Aspects of Using Cryptographic Methods to Protect Databases from Unauthorized Access. Cybersecurity Education Science Technique. https://doi.org/10.28925/2663-4023.2025.28.786
Kovalchuk, M. (2025). Hybrid Threats and Economic Coercion: Contemporary Challenges to Economic Security in The Digital Environment. Bulletin of the Academy of Labor, Social Relations and Tourism. Series: Economics, Psychology and Management. https://doi.org/10.54929/3041-2390-2025-05-01-04
Kozachenko, R. (2025). Comparison Of National Security Strategies: Approaches of Large and Small States in Ensuring Their Own Security and Their Impact on International Relations. Epistemological Studies in Philosophy Social and Political Sciences, 8(1). https://doi.org/10.15421/342527
Krainiuk, O., Yevseiev, S., Didenko, N., & Piksasov, M. (2025). Transformation of the Regulatory and Legal Framework for Cybersecurity in Ukraine: Analysis of Compliance with The Requirements of The Nis2 Directive and The Cybersecurity Act. Terra Security, 1(3). https://doi.org/10.20998/3083-6298.2025.03.05
Lund, M. S. (2024). Hybrid Threats in Cyberspace: What Do Russia’s Cyberspace Operations in Ukraine Tell Us? In Preparing for Hybrid Threats to Security: Collaborative Preparedness and Response. https://doi.org/10.4324/9781032617916-7
Maltsev, V., Sharko, D., & Dashkovskyi, A. (2025). State Security of Ukraine in The Face of Modern Challenges and Threats. The Scientific Journal of The National Academy of National Guard “Honor and Law,” 3(94). https://doi.org/10.33405/2078-7480/2025/3/94/349247
Metreveli, S. (2025). The Impact of Hybrid Threats on National Security: Mechanisms for Conflict Prevention and Transformation. (4). https://doi.org/10.61446/Ds.4.2025.10467
Mitrović, M. (2019). Hybrid Genesis of Information Operations in Cyberspace. Teme. https://doi.org/10.22190/Teme1804359m
Nawaz, Dr. F. (2025). Psychological Warfare in The Digital Age: Strategies, Impacts, And Countermeasures. Journal of Future Building, 2(1).
Nikolov, O. (2018). Building Societal Resilience Against Hybrid Threats. Information & Security: An International Journal, 39(1). https://doi.org/10.11610/Isij.3908
Poptchev, P. (2020). NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages. Information & Security: An International Journal, 45. https://doi.org/10.11610/Isij.4503
Pramitasari, A. W. (2022). The Role of Intelligence in Dealing with The Threat of Hybrid War. The International Journal of Business Management and Technology, 6(1).
Sembiring, H., Supriyadi, A. A., & Ghazalie, G. (2025). Network Centric Warfare (NCW)-Based Defense Policy Strategy for Addressing Asymmetric Threats. Jurnal Ilmiah Global Education, 6(4). https://doi.org/10.55681/Jige.V6i4.4847
Semenenko, O., Kirsanov, S., Movchan, A., Sliusarenko, M., & Horhulenko, V. (2025). Addressing The Legal Gaps in AI Regulation for National Security: The Case of Ukraine’s Defense Sector. Revista De Direito, Estado E Telecomunicacoes, 17(2). https://doi.org/10.26512/Lstr.V17i2.56351
Semenenko, O., Koval, V., Vodchyts, O., & Dobrovolskyi, Y. (2024). A Multi-Domain Operation – A Modern View at The Forms and Methods of Military Operations Adapting to The Environment of Challenges and Threats Transformation. Міжнародний Науковий Журнал «Military Science», 2(1). https://doi.org/10.62524/Msj.2024.2.1.02
Sinani, T., & Hoxha, B. (2025). The Security Strategy of Small States in the 21st Century and Beyond. Academic Journal of Business, Administration, Law and Social Sciences, 11(1). https://doi.org/10.2478/Ajbals-2025-0004
Suhirwan Suhirwan, & Mia Kusmiati. (2025). Integrative Model Defense Indonesian Hybrid in Face Dynamics ASEAN Conflict. Management Dynamics: International Journal of Management and Digital Sciences, 2(4). https://doi.org/10.70062/Managementdynamics.V2i4.422
Wither, J. K., Iasiello, E. J., John, C., Neal, J., Army, U. S., Ryan, C., Worthan, L., Cantwell, L. D., Pernik, P., & Jezewski, C. R. (2020). Perspectives On Hybrid Warfare. Journal Of European Security and Defence Issues, 10(1).
Zamykalová, Š. (2025). Critical But Also Strategic Infrastructure Must Be More Resilient Than Ever. Central European Journal of Security Studies, 2025(Issue 1). https://doi.org/10.15804/Cejss.2025106
Zeeshan, F. (2025). Russia-Ukraine Cyber Warfare and Its Impacts on Poland’s National Security. Wah Academia Journal of Social Sciences, 4(1).
Zhevelieva, I. S. (2025). Criminal Legal Qualification of Offenses in The Field of Use of Electronic Computing Machines (Computers), Systems and Computer Networks and Electric Communication Networks. Uzhhorod National University Herald. Series: Law, 4(91). https://doi.org/10.24144/2307-3322.2025.91.4.8
Zinchenko, O. (2025). Cybersecurity As an Element of Democratic Consolidation: Lessons from Kharkiv Region. The Journal of V. N. Karazin Kharkov National University. Issues Of Political Science, (47). https://doi.org/10.26565/2220-8089-2025-47-06
Zulfian, M. H., & Rahmadan, Y. (2025). Analyzing Russia’s Hybrid Warfare Strategy Through Hermeticwiper Against Ukraine: A Cybersecurity and Desecuritization Approach. Politeia: Journal of Public Administration and Political Science and International Relations, 3(3). https://doi.org/10.61978/politeia.V3i3.673
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Shoraya Lolyta Octaviana, Totok Imam Santoso, Zainal Abidin Sahabuddin, Guntur Eko Saputro

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






