Actual and future digital threats and their impact on civil and military cybersecurity management
More details
Hide details
Department of Management and Economic Informatics, Transilvania University of Brasov, Faculty of Economics and Business Administration, Romania
Spiru Haret University Bucharest, Faculty of Legal Science and Economics, Romania
Submission date: 2022-12-08
Final revision date: 2022-12-28
Acceptance date: 2022-12-29
Online publication date: 2023-01-05
Publication date: 2023-01-05
Corresponding author
Oriana Helena Negulescu   

Department of Management and Economic Informatics, Transilvania University of Brasov, Faculty of Economics and Business Administration, Romania
Przegląd Nauk o Obronności 2022;(15):60-84
(1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4) What are the ways to detect digital threats? (5) What measures can be taken to prevent and avoid these attacks? (6) What does the cyber security management process consist of? (7) What cybersecurity evidence and trends can be selected?

document analysis; data selection and assambly; synthesis; conceptualization; interpretation.

The research results are: a presentation of the hacker community and the main vulnerable industries; a brief definition of the types of digital threats; presentation of various vulnerabilities and damages caused by cyber-attacks; a selection of the ways to detect digital threats; a selection of the main measures to prevent and avoid these attacks; cybersecurity management process and a selection of evidence and trends regarding cyber security. Also, two conceptualizations are proposed: the approach to cyber risk management and 10 basic actions to prevent and avoid cyber risks.

The current and future situation is not encouraging for the management of organizations in terms of the risks caused by cyber-attacks, which are increasing significantly. The solution to prevent and avoid these threats is for civil and military organizations to implement Cybersecurity risk management.

Abdel Hakeem, S.A.; Hussein, H.H.; Kim, H. (2022) Security Requirements and Challenges of 6G Technologies and Applications. Sensors 2022, 22, 1969.
Adrian, F. (2012) National and international security objectives: some correlations, Journal of Defense Resources Management, Vol.3, Iss.1 (4), 2012, pp. 113-116.
Akpan F, Bendiab G, Shiaeles S, Karamperidis S, Michaloliakos M. Cybersecurity Challenges in the Maritime Sector. Network. 2022; 2(1):123-138.
Borek, R., Woźnica, J. and Malawski, M. (2022) The role of eu public diplomacy in affecting international security in the context of the development of the outer space traffic management, Defence science review, DOI: 10.37055/pno/153381.
Brewer, R. (2016). Ransomware attacks: Detection, prevention and cure. Netw. Secur. 2016, 5–9. doi: 10.1016/S1353-4858(16)30086-1.
Carey, M.J. & Jin, J. (2019) Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, Wiley.
Dahiya, A., and Gupta, B. B. (2020). An economic incentive-based risk transfer approach for defending against DDoS attacks. Intl. J. E-Serv. Mob. Appl. 12, 60–84. doi: 10.4018/IJESMA.2020070104.
Kraus, R., Barber, B., Borkin, M., Alpern, N.J. (2010) Seven Deadliest Microsoft Attacks, ch 7, pp 129-145.
Liu, X., Ahmad,S.F., Anser, M.K., Ke, J., Irshad, M., Ul-Haq, J. and Abbas, S. (2022) Cyber security threats: A never-ending challenge for e-commerce, Front. Psychol., 19 October 2022, Sec. Organizational Psychology,
Monnappa K. A. (2018) Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware, Packt Publishing.
Negulescu, O. (2015) Threats and opportunities in actual defence management in Proceedings of The 10th International Scientific Conference “Defence resources management in the 21st century” Braşov, 2015, National Defence University ,,Carol I” publishing house Braşov, pp. 205-214.
Radomska, A. (2021) Development directions of cybersecurity in aerospace, Defence science review, DOI: 10.37055/pno/147400.
Sikorski, M. & Honig, A. (2012) Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, No Starch Press.
Szyłkowska, M. (2022) Attributes of cyber conflict in the context of armed conflict – an outline of the problem, Defence science review, DOI: 10.37055/pno/148424.
Journals System - logo
Scroll to top