Emerging Digital Technologies and Cybersecurity Challenges

Authors

DOI:

https://doi.org/10.52340/splogos.2025.03.13

Keywords:

emerging digital technologies, cybersecurity, cyberattacks, critical infrastructure, global cooperation

Abstract

The rapid development of modern digital technologies has radically changed the global security paradigm. Artificial intelligence, blockchain, the Internet of Things (IoT), 5G connectivity, and cloud infrastructure create new opportunities, but at the same time increase the complexity and threats of cybersecurity. Along with these technologies, the scale, complexity, and potential for covert impact of cyberattacks on both the public and private sectors are increasing. Critical infrastructures, government agencies, and databases, whose security is directly related to national and international stability, are particularly at risk. The presented paper aims to analyze the main cybersecurity challenges associated with emerging digital technologies. The study is based on case studies, international practice, and modern strategic approaches. Special attention is paid to the concept of cyber resilience, incident response mechanisms, and multi-level coordination. The paper highlights the need for integrated policies, digital solidarity, and technological sovereignty. The abstract reflects the interdisciplinary nature of cybersecurity and emphasizes the need for continuous improvement of prevention, response, and recovery processes in the context of technological progress.

Downloads

Download data is not yet available.

Author Biography

Lika Lagvilava, Caucasus International University

Ph.D. Student, Doctoral Educational Program in Political Science, Faculty of Social and Humanitarian Sciences

References

სიდამონიძე ნ., „STUXNET – გლობალური მნიშვნელობის კიბერ იარაღი, რომელმაც ბირთვული საფრთხე შეაჩერა“, ანალიტიკური ცენტრი, გვ.1. 2023. https://shorturl.at/ZFTbI (ბ.ნ. 23.07.2025).

Anderson R. J., “Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.)“, Wiley, pp. 1-30. 2020, https://download.e-bookshelf.de/download/0015/3092/35/L-G-0015309235-0048729244.pdf (ბ.ნ. 23.07.2025).

Bada A., & Nurse J. R. C., “Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)”, Information & Computer Security, 27(3), pp. 393-410, 2019, https://scispace.com/pdf/developing-cybersecurity-education-and-awareness-programmes-2pyn2vv1gy.pdf (ბ.ნ. 25.07.2025.)

Böhme R., & Moore T., “The iterated weakest link–A model of adaptive security investment“, Workshop on the Economics of Information Security (WEIS), pp. 81-102, 2012, https://www.scirp.org/pdf/JIS_2016033115021747.pdf (ბ.ნ. 23.07.2025).

Clarke R., & Knake R. K., “Cyber War: The Next Threat to National Security and What to Do About It”, Ecco, 2010, https://georgetownsecuritystudiesreview.org/2013/12/10/richard-a-clarke-and-robert-k-knakes-cyber-war-the-next-threat-to-national-security-and-what-to-do-about-it-harper-collins-2010/ (ბ.ნ. 24.07.2025).

Conti M., Dehghantanha A., Franke K., & Watson S. ‘’Internet of Things security and forensics: Challenges and opportunities”, Future Generation Computer Systems, 78, pp. 544-546, 2018, https://arxiv.org/pdf/1807.10438 (ბ.ნ. 23.07.2025).

Greenberg A., “Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers”, Doubleday, pp. 1-371, 2020, https://dokumen.pub/sandworm-a-new-era-of-cyberwar-and-the-hunt-for-the-kremlins-most-dangerous-hackers-978-0385544405.html (ბ.ნ. 23.07.2025).

Mohammad N., Khatoon R., Nilima S. I., Akter J., Kamruzzaman M., Sozib H. M., “Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions”, Scientific Research, pp. 257-277, 2024, https://www.scirp.org/journal/paperinformation?paperid=135664 (ბ.ნ. 23.07.2025).

Scmitt M. N., “Tallinn Manual on the International Law Applicable to Cyber Warfare NATO Cooperative Cyber Defence Centre of Excellence”, Cambridge University Press, pp. 1-215. 2013 https://csef.ru/media/articles/3990/3990.pdf (ბ.ნ. 24.07.2025).

Singer, P. W., & Friedman, A. “Cybersecurity and Cyberwar: What Everyone Needs to Know“. Oxford University Press, pp. 1-33, 2014, https://api.pageplace.de/preview/ DT0400.9780199918102_A23618218/preview-9780199918102_A23618218.pdf (ბ.ნ. 24.07.2025)

Singh S., Hosen A. S. M., Yoon B., ‘’Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network”, IEEE Access, 8, pp. 13938-13959, 2021, https://scispace.com/pdf/blockchain-security-attacks-challenges-and-solutions-for-the-47ml7a9t5w.pdf (ბ.ნ. 23.07.2025).

Svitlyk Y., ,,ყველაზე ცნობილი ჰაკერული თავდასხმები, რომლებიც მთელ მსოფლიოში მოხვდა”, Root Nation, pp.1. 2023, https://ka.root-nation.com/en/articles-en/tech-en/en-most-famous-hacker-attacks/ (ბ.ნ. 25.07.2025).

Svitlyk Y., ,,OpenAI ახალი სუპერძალა: რა არის ChatGPT აგენტი?”, Root Nation, pp. 1. 2023, https://ka.root-nation.com/en/articles-en/services-en/en-chatgpt-new-super-power/ (ბ.ნ. 25.07.2025).

Published

2025-12-29

How to Cite

Lagvilava, L. (2025). Emerging Digital Technologies and Cybersecurity Challenges. SOCIOPOLITOLOGOS, 3, 148–159. https://doi.org/10.52340/splogos.2025.03.13

Issue

Section

Articles

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.