Show simple item record

[comment]

dc.contributor.authorSchulze, Matthiasde
dc.contributor.authorKerttunen, Mikade
dc.date.accessioned2023-08-01T08:25:23Z
dc.date.available2023-08-01T08:25:23Z
dc.date.issued2023de
dc.identifier.issn2747-5107de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/88112
dc.description.abstractOne year after Russia's invasion of Ukraine, certain assumptions about the utility of cyber operations during wartime can now be put to the test. Russian cyber salvos opened this war, but they failed to achieve their objectives in the face of a resilient cyber defender. Joint cyber/conventional warfighting is still hard to implement due to its uncertain effects, the potential for spill-over, malware development cycles, and differing operational tempos. Cyber operations against Ukraine have not (yet) achieved major strategic effects in reducing Ukraine's capacity to resist. Additionally, Russian information operations targeting Ukrainian and Western audiences fell on deaf ears. The greatest value of cyber operations therefore still appears to lie in their intelligence and reconnaissance functions. (author's abstract)de
dc.languageende
dc.subject.ddcPolitikwissenschaftde
dc.subject.ddcPolitical scienceen
dc.subject.otherInformationskriegführung; Information bezogene militärische Operation; Elektronische Kampfführung; Informationssicherheit; Kritische Infrastrukturen; Verwundbarkeit von Zielende
dc.titleCyber operations in Russia's war against Ukraine: uses, limitations, and lessons learned so farde
dc.description.reviewbegutachtetde
dc.description.reviewrevieweden
dc.source.volume23/2023de
dc.publisher.countryDEUde
dc.publisher.cityBerlinde
dc.source.seriesSWP Comment
dc.subject.classozFriedens- und Konfliktforschung, Sicherheitspolitikde
dc.subject.classozPeace and Conflict Research, International Conflicts, Security Policyen
dc.subject.thesozRusslandde
dc.subject.thesozRussiaen
dc.subject.thesozUkrainede
dc.subject.thesozUkraineen
dc.subject.thesozKriegde
dc.subject.thesozwaren
dc.subject.thesozKriegsführungde
dc.subject.thesozwarfareen
dc.subject.thesozInformationstechnologiede
dc.subject.thesozinformation technologyen
dc.subject.thesozKommunikationstechnologiede
dc.subject.thesozcommunication technologyen
dc.identifier.urnurn:nbn:de:0168-ssoar-88112-1
dc.rights.licenceDeposit Licence - Keine Weiterverbreitung, keine Bearbeitungde
dc.rights.licenceDeposit Licence - No Redistribution, No Modificationsen
ssoar.contributor.institutionSWPde
internal.statusformal und inhaltlich fertig erschlossende
internal.identifier.thesoz10057012
internal.identifier.thesoz10064141
internal.identifier.thesoz10035033
internal.identifier.thesoz10050019
internal.identifier.thesoz10047425
internal.identifier.thesoz10039942
dc.type.stockmonographde
dc.type.documentStellungnahmede
dc.type.documentcommenten
dc.source.pageinfo8de
internal.identifier.classoz10507
internal.identifier.document27
dc.contributor.corporateeditorStiftung Wissenschaft und Politik -SWP- Deutsches Institut für Internationale Politik und Sicherheit
internal.identifier.corporateeditor292
internal.identifier.ddc320
dc.identifier.doihttps://doi.org/10.18449/2023C23de
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence3
internal.identifier.pubstatus1
internal.identifier.review2
internal.identifier.series756
dc.subject.classhort10500de
internal.pdf.validfalse
internal.pdf.wellformedtrue
internal.pdf.encryptedfalse


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record