Cyber Threats in Hybrid Warfare: A Strategic Mapping and Response Framework for National Defense

Authors

  • Shoraya Lolyta Octaviana Universitas Pertahanan, West Java, Indonesia
  • Totok Imam Santoso Universitas Pertahanan, West Java, Indonesia
  • Zainal Abidin Sahabuddin Universitas Pertahanan, West Java, Indonesia
  • Guntur Eko Saputro Universitas Pertahanan, West Java, Indonesia

DOI:

https://doi.org/10.52690/jswse.v7i3.1556

Keywords:

Cyber Threats and Cybersecurity, Hybrid Warfare, National Defense, Strategic Response

Abstract

Hybrid warfare integrates military and non-military instruments, with cyberspace emerging as a critical domain. Cyber threats in this context are systemic, multidimensional, and difficult to attribute, yet existing studies often treat cybersecurity and hybrid warfare separately. This study maps cyber threats within hybrid warfare frameworks and formulates strategic responses to support national defense. A qualitative descriptive approach was used, combining systematic literature review (45 peer-reviewed articles and policy documents, 2018–2025), Soft System Methodology (SSM) for complexity analysis, and SWOT analysis for strategic formulation. Four principal cyber threat types were identified: attacks on critical infrastructure, cyber espionage, disinformation campaigns, and influence operations. Key characteristics include multidimensionality, attribution difficulty, asymmetry, and involvement of both state and non-state actors. SSM revealed interconnected systems across technology, governance, and society. SWOT analysis identified strengths (growing digital human resources) and weaknesses (limited inter-agency coordination). A strategic response model comprising system integration, capacity enhancement, and national coordination is proposed. National defense systems must adopt holistic, adaptive frameworks that integrate cyber capabilities, cross-sectoral collaboration, and societal resilience. Future research should empirically test the proposed model in national defense contexts.

References

Balan, S., Balan, L., Vorotynskyy, V., Rybak, I., & Tarasiuk, V. (2025). State Information Policy in The Context of Hybrid Threats: Legal and Political Aspects. Social And Legal Studios, 8(1). https://doi.org/10.32518/Sals1.2025.165

Bila, А. V. (2024). Modern Problematic Aspects of Forensics in The Context of Martial Law in Ukraine and Global ThreATS. Alfred Nobel University Journal of Law, 2(9). https://doi.org/10.32342/3041-2218-2024-2-9-10

Dr. Muhammad Hatim, Dr. Adeel Irfan, Elahi Umar Ranjha, Haroon Shah, & Muhammad Ahmad. (2025). Hybrid Conflict in the 21st Century: Pakistan’s Security Dilemmas and Responses. Social Science Review Archives, 3(2). https://doi.org/10.70670/Sra.V3i2.684

Farrand, B., Carrapico, H., & Turobov, A. (2024). The New Geopolitics of EU Cybersecurity: Security, Economy and Sovereignty. International Affairs, 100(6). https://doi.org/10.1093/Ia/Iiae231

Hulak, N., Ilyenko, A., & Dubchak, O. (2025). Practical Aspects of Using Cryptographic Methods to Protect Databases from Unauthorized Access. Cybersecurity Education Science Technique. https://doi.org/10.28925/2663-4023.2025.28.786

Kovalchuk, M. (2025). Hybrid Threats and Economic Coercion: Contemporary Challenges to Economic Security in The Digital Environment. Bulletin of the Academy of Labor, Social Relations and Tourism. Series: Economics, Psychology and Management. https://doi.org/10.54929/3041-2390-2025-05-01-04

Kozachenko, R. (2025). Comparison Of National Security Strategies: Approaches of Large and Small States in Ensuring Their Own Security and Their Impact on International Relations. Epistemological Studies in Philosophy Social and Political Sciences, 8(1). https://doi.org/10.15421/342527

Krainiuk, O., Yevseiev, S., Didenko, N., & Piksasov, M. (2025). Transformation of the Regulatory and Legal Framework for Cybersecurity in Ukraine: Analysis of Compliance with The Requirements of The Nis2 Directive and The Cybersecurity Act. Terra Security, 1(3). https://doi.org/10.20998/3083-6298.2025.03.05

Lund, M. S. (2024). Hybrid Threats in Cyberspace: What Do Russia’s Cyberspace Operations in Ukraine Tell Us? In Preparing for Hybrid Threats to Security: Collaborative Preparedness and Response. https://doi.org/10.4324/9781032617916-7

Maltsev, V., Sharko, D., & Dashkovskyi, A. (2025). State Security of Ukraine in The Face of Modern Challenges and Threats. The Scientific Journal of The National Academy of National Guard “Honor and Law,” 3(94). https://doi.org/10.33405/2078-7480/2025/3/94/349247

Metreveli, S. (2025). The Impact of Hybrid Threats on National Security: Mechanisms for Conflict Prevention and Transformation. (4). https://doi.org/10.61446/Ds.4.2025.10467

Mitrović, M. (2019). Hybrid Genesis of Information Operations in Cyberspace. Teme. https://doi.org/10.22190/Teme1804359m

Nawaz, Dr. F. (2025). Psychological Warfare in The Digital Age: Strategies, Impacts, And Countermeasures. Journal of Future Building, 2(1).

Nikolov, O. (2018). Building Societal Resilience Against Hybrid Threats. Information & Security: An International Journal, 39(1). https://doi.org/10.11610/Isij.3908

Poptchev, P. (2020). NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages. Information & Security: An International Journal, 45. https://doi.org/10.11610/Isij.4503

Pramitasari, A. W. (2022). The Role of Intelligence in Dealing with The Threat of Hybrid War. The International Journal of Business Management and Technology, 6(1).

Sembiring, H., Supriyadi, A. A., & Ghazalie, G. (2025). Network Centric Warfare (NCW)-Based Defense Policy Strategy for Addressing Asymmetric Threats. Jurnal Ilmiah Global Education, 6(4). https://doi.org/10.55681/Jige.V6i4.4847

Semenenko, O., Kirsanov, S., Movchan, A., Sliusarenko, M., & Horhulenko, V. (2025). Addressing The Legal Gaps in AI Regulation for National Security: The Case of Ukraine’s Defense Sector. Revista De Direito, Estado E Telecomunicacoes, 17(2). https://doi.org/10.26512/Lstr.V17i2.56351

Semenenko, O., Koval, V., Vodchyts, O., & Dobrovolskyi, Y. (2024). A Multi-Domain Operation – A Modern View at The Forms and Methods of Military Operations Adapting to The Environment of Challenges and Threats Transformation. Міжнародний Науковий Журнал «Military Science», 2(1). https://doi.org/10.62524/Msj.2024.2.1.02

Sinani, T., & Hoxha, B. (2025). The Security Strategy of Small States in the 21st Century and Beyond. Academic Journal of Business, Administration, Law and Social Sciences, 11(1). https://doi.org/10.2478/Ajbals-2025-0004

Suhirwan Suhirwan, & Mia Kusmiati. (2025). Integrative Model Defense Indonesian Hybrid in Face Dynamics ASEAN Conflict. Management Dynamics: International Journal of Management and Digital Sciences, 2(4). https://doi.org/10.70062/Managementdynamics.V2i4.422

Wither, J. K., Iasiello, E. J., John, C., Neal, J., Army, U. S., Ryan, C., Worthan, L., Cantwell, L. D., Pernik, P., & Jezewski, C. R. (2020). Perspectives On Hybrid Warfare. Journal Of European Security and Defence Issues, 10(1).

Zamykalová, Š. (2025). Critical But Also Strategic Infrastructure Must Be More Resilient Than Ever. Central European Journal of Security Studies, 2025(Issue 1). https://doi.org/10.15804/Cejss.2025106

Zeeshan, F. (2025). Russia-Ukraine Cyber Warfare and Its Impacts on Poland’s National Security. Wah Academia Journal of Social Sciences, 4(1).

Zhevelieva, I. S. (2025). Criminal Legal Qualification of Offenses in The Field of Use of Electronic Computing Machines (Computers), Systems and Computer Networks and Electric Communication Networks. Uzhhorod National University Herald. Series: Law, 4(91). https://doi.org/10.24144/2307-3322.2025.91.4.8

Zinchenko, O. (2025). Cybersecurity As an Element of Democratic Consolidation: Lessons from Kharkiv Region. The Journal of V. N. Karazin Kharkov National University. Issues Of Political Science, (47). https://doi.org/10.26565/2220-8089-2025-47-06

Zulfian, M. H., & Rahmadan, Y. (2025). Analyzing Russia’s Hybrid Warfare Strategy Through Hermeticwiper Against Ukraine: A Cybersecurity and Desecuritization Approach. Politeia: Journal of Public Administration and Political Science and International Relations, 3(3). https://doi.org/10.61978/politeia.V3i3.673

Downloads

Published

2026-05-16

How to Cite

Octaviana, S. L., Santoso, T. I., Sahabuddin, Z. A., & Saputro, G. E. (2026). Cyber Threats in Hybrid Warfare: A Strategic Mapping and Response Framework for National Defense. Journal of Social Work and Science Education, 7(3), 1965–1973. https://doi.org/10.52690/jswse.v7i3.1556

Similar Articles

<< < 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.