email   Email Us: phone   Call Us: +1 (914) 407-6109   57 West 57th Street, 3rd floor, New York - NY 10019, USA

Lupine Publishers Group

Lupine Publishers

  Submit Manuscript

ISSN: 2641-6921

Modern Approaches on Material Science

Mini Review(ISSN: 2641-6921)

Cyber Hybrid Warfare: Asymmetric Threat

Volume 3 - Issue 1

Christos Beretas*

  • Author Information Open or Close
    • PhD Candidate, in Cyber Security at Innovative Knowledge Institute, Paris, France

    *Corresponding author: Christos Beretas, PhD Candidate (full scholarship) in Cyber Security at Innovative Knowledge Institute, Paris, France

Received: May 07, 2020;   Published: May 18, 2020

DOI: 10.32474/MAMS.2020.03.000151

Full Text PDF

To view the Full Article   Peer-reviewed Article PDF


Cyber hybrid warfare has been known since antiquity; it is not a new terminology nor a new practice. It can have an effect even more than a regular conventional war. The implementation of the cyber hybrid war aims to misinform, guide and manipulate citizens, disorganize the target state, create panic, overthrow governments, manipulate sensitive situations, intimidate groups, individuals and even shortened groups of the population, and finally to form an opinion according to the enemy’s beliefs. Creating online events designed to stimulate citizens to align with the strategy of governments or the strategy of the enemy government is a form of cyber hybrid warfare. The cyber hybrid warfare falls under the category of asymmetric threats as it is not possible to determine how, and the duration of the cyber invasion. The success or not of a cyber hybrid war depends on the organization, the electronic equipment, and the groups of actions they decide according to the means at their disposal to create the necessary digital entities. Finally, the cyber hybrid warfare is often used to show online military equipment aimed at downplaying its moral opponent.

Keywords: Hybrid war, Cyber war, Online threat, Cyber warfare, Warfare

Abstract| Introduction| Characteristics| Conclusion| References|