{"title":"How to Counter Hybrid Threats","authors":"L. Monov, M. Karev","doi":"10.11610/isij.3909","DOIUrl":null,"url":null,"abstract":"This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information & Security: An International Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11610/isij.3909","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.