Cybersecurity, Asymmetric Threats, and Modern Military-Political Reality
DOI:
https://doi.org/10.52340/splogos.2025.03.09Keywords:
cybersecurity, asymmetric threats, cyberwar, international security, military-political realityAbstract
Cyberspace has become a new arena of power in modern international relations, where military and political interests are intertwined. The rapid development of digital technologies has significantly altered the architecture of global security, giving rise to asymmetric threats that are radically different in scale and impact from traditional military challenges. Cybersecurity today is no longer just a technical issue; it is one of the most significant determinants of military and political processes, which affects both the strategic decisions of states and the stability of the international system. The article reviews the evolution of the concept of cybersecurity, the types of asymmetric threats and how they manifest themselves, and also reveals the military-political dimensions of cyberwar. Special attention is paid to how cyberattacks have become an integral element of modern wars and what challenges this poses to international security institutions. The analysis is based on historical-theoretical foundations, international practice, and examples of modern conflicts, which makes it possible to outline the role of cybersecurity in the military-political reality of the 21st century.
Downloads
References
გამოყენებული ლიტერატურა
ზედელაშვილი, თ. 2023. “კიბერშესაძლებლობები და გლობალური უსაფრთხოების ახალი გამოწვევები.” https://dspace.nplg.gov.ge/bitstream/1234/482400/1/KibershesadzleblobebiDaGlobaluriUsafrtxoebisAxaliGamowvevebi.pdf?utm.
კობა ლიკლიკაძე. 2013. “როგორი წესებით უნდა ვიომოთ კიბერომში?” რადიო თავისუფლება, https://www.radiotavisupleba.ge/a/military-programm/24950058.html.
საქართველოს მთავრობა, 2021. „საქართველოს კიბერუსაფრთხოების 2021-2024 წლების ეროვნული სტრატეგია“, საქართველო, თბილისი. https://matsne.gov.ge/ka/document/view/5263611?publication=0
Almalawi, A., Hassan, S., Fahad, A., Iqbal, A. and Khan, I. A. 2025. “Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations.” Symmetry 17 (4): 616–16. https://doi.org/10.3390/sym17040616.
Aos, M., Qolomany, B., Gyorick, K., Abdo, B. J., Aledhari, M., Qadir, J., Carley, K., and Al-Fuqaha, A. 2025. “A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects.” Computers in Human Behavior Reports 18 (100668): https://doi.org/10.1016/j.chbr.2025.100668.
Anna-Maria, O. and Rõigas, H. 2016. “International Cyber Norms Legal, Policy & Industry Perspectives.” https://ccdcoe.org/uploads/2018/10/InternationalCyberNorms_full_book.pdf.
Chitadze, N. 2023. “IRMA-International.org: Cyber Security Policies and Strategies of the World’s Leading States (9781668488461)(1668488469)(9781668488478): Nika Chitadze: Books.” Irma-International.org. https://www.irma-international.org/book/cyber-security-policies-strategies-world/316140/?utm_source=chatgpt.com.
Chitadze, N. 2022. “Cyber Warfare – New Threat for National and International Security and Transformation of the Conflicts under the Conditions of the New Geopolitical Order.” Journal of Social Sciences 7 (2): 70–76. https://doi.org/10.31578/jss.v7i2.120.
Eduard, K. 2023. “A Year of Conflict: Cybersecurity Industry Assesses Impact of Russia-Ukraine War.” SecurityWeek, https://www.securityweek.com/one-year-of-russia-ukraine-war-cybersecurity-industry-sums-up-impact/.
Gesley, J. 2016. “Cyber Warfare: Military Cross-Border Computer Network Operations under International Law. By Johann-Christoph Woltag. Cambridge, Antwerp, Portland: Intersentia Publisher, 314. ISBN: 978-1780682266.” International Journal of Legal Information 44 (1): 61–62. https://doi.org/10.1017/jli.2016.9.
James, K., Ahmad, A., and Scheepers, R. 2022. “Adopting and Integrating Cyber-Threat Intelligence in a Commercial Organisation.” European Journal of Information Systems 32 (1): 1–17. https://doi.org/10.1080/0960085x.2022.2088414.
Lomidze, N. 2022. “Cyber Security Challenges in Georgia”. Georgian Scientists 4 (3):120-33. https://doi.org/10.52340/gs.2022.04.03.15.
Laura S, T., O Sami, S. and Farrell, D. 2024. “Cyberwar Strategy and Tactics: An Analysis of Cyber Goals, Strategies, Tactics, and Techniques.” ArXiv.org. 2024. https://arxiv.org/abs/2406.00496.
Lex, C. 2024. “Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion | MITRE-Engenuity.” Medium. MITRE-Engenuity. https://medium.com/mitre-engenuity/technical-deep-dive-understanding-the-anatomy-of-a-cyber-intrusion-080bddc679f3.
Mostofa, A., Nygard, E. K., Gomes, R., Chowdhury, M. M., Rifat, N. and Connolly, F J. 2022. “Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—a Review.” Journal of Cybersecurity and Privacy 2 (3): 527–55. https://doi.org/10.3390/jcp2030027.
Mikael, W., Nilsson, N., Palmertz, B., and Thunholm, P. 2021. Hybrid Warfare: Security and Asymmetric Conflict in International Relations. London: I.B. Tauris,. http://dx.doi.org/10.5040/9781788317795.
NATO. 2016. “Cyber Defence Pledge.” NATO. https://www.nato.int/cps/en/natohq/official_texts_133177.htm?utm.
NATO. 2021. “North Atlantic Treaty Organization Www.nato.int/Factsheets Factsheet NATO Cyber Defence.” https://www.nato.int/nato_static_fl2014/assets/pdf/2021/4/pdf/2104-factsheet-cyber-defence-en.pdf.
Shekeladze, A. 2022. “GEORGIAN EXPERIENCE of DEVELOPING CYBER CAPABILITIES in the DEFENCE FIELD.” https://jodrm.eu/wp-content/uploads/2025/04/02-Shekeladze.pdf?utm_source=chatgpt.com.
Sevis K. N. and Seker, E. 2016. "Cyber warfare: terms, issues, laws and controversies," 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, UK, doi: 10.1109/CyberSecPODS.2016.7502348
Vicens, AJ. 2022. “Ukraine Warns of ‘Massive Cyberattacks’ Coming from Russia on Critical Infrastructure Sites.” CyberScoop. September 26, 2022. https://cyberscoop.com/ukrainians-warn-of-massive-cyberattacks/.
Weissmann, M., Nilsson, N., 2024. “Russian Warfare and Influence.” Bloomsburycollections.com 1 (978-1-3503-3524-0). https://doi.org/b-9781350335257.
Woltag, J. C. 2014. Cyber Warfare: Military Cross-Border Computer Network Operations under International Law. of International Law. Intersentia.
Yuan, T. L. 2024. “Asymmetry in the Digital Age: Cyber Deterrence Strategies for Small States.” Journal of Strategic Security 17 (4): 71–88. https://doi.org/10.5038/1944-0472.17.4.2268.
Zeeshan, F. 2025. “Cyber Warfare and International Security: A New Geopolitical Frontier.” The Critical Review of Social Sciences Studies 3 (2): 513–27. https://doi.org/10.59075/k9cbhz04.



