Hybrid Cyber Threats: Lithuanian Context

Abstract:

This academic paper conducts a comprehensive analysis of hybrid cyber threats within the Lithuanian context, focusing on the examination of national strategies formulated to address and mitigate these complex challenges. Hybrid cyber threats, characterized by the amalgamation of traditional cyber methods with elements of disinformation, psychological warfare, and geopolitical manipulation present unique challenges to national security. This study explores how Lithuania’s national strategies have evolved to counteract these multifaceted threats, offering insights into the effectiveness of current approaches, and identifying potential areas for improvement.

The research employs a comparative analysis of Lithuania’s historical and contemporary national cybersecurity strategies, examining their alignment with the evolving nature of hybrid cyber threats. By evaluating the integration of cybersecurity measures with broader national security policies, the study aims to uncover the strengths and weaknesses in Lithuania’s preparedness and response mechanisms.


AUTHORS

Photo of Darius Štitilis

Mykolas Romeris University,
Lithuania

Darius Štitilis has a Ph.D. in Social Science (Law), is a professor and Dean of the Faculty of Public Governance and Business at Mykolas Romeris University. Štitilis has more than 20 years experience in teaching and researching in the area of IT law (personal data protection, cybersecurity, cybercrime, legal regulation of biometrical technologies, and AI). Štitilis is also an expert with 20+ years experience in international and national research and study projects. Darius Štitilis founded and is currently the head of the study program Cybersecurity Management. One of the last international projects in the field of cyber security, in which Darius Štitilis participated, is one of the four cybersecurity pilot projects financed by the European Commission—the http://sparta.eu project. Štitilis has also contributed to the creation of the Lithuanian cyber security strategy model and was the leader and initiator of the project during which this model was created.

Photo of Marius Laurinaitis

Mykolas Romeris University,
Vilnius, Lithuania

Marius Laurinaitis is an associate professor at Mykolas Romeris University; he directs the law and FinTech study program. He obtained a Ph.D. degree in law from Mykolas Romeris University in 2015. The topic of his dissertation was related to the Legal Regulation of Electronic Money. He is the executive editor of the international scientific research journal Intellectual Economics. His research interests include IT law, privacy and personal data protection law, electronic identification law, electronic payments law, and electronic money. He has over 15 publications, primarily in the field of law, financial services, and IT.

Photo of Professor Matt Warren

RMIT University
Melbourne, Australia

Univeristy of Johannesburg,
Johannesburg, South Africa

Matt Warren is the Director of the RMIT Centre of Cyber Security Research and Innovation and a Professor of Cyber Security at RMIT University, Australia. Professor Warren is a researcher in the areas of cyber security and computer ethics. He has authored and co-authored over 300 books, book chapters, journal papers, and conference papers. He has received numerous grants and awards from national and international funding bodies, such as AustCyber, Australian Research Council (ARC), CyberCRC, Engineering Physical Sciences Research Council (EPSRC) in the UK, National Research Foundation in South Africa and the European Union. Professor Warren earned his Ph.D. in Information Security Risk Analysis from the University of Plymouth, United Kingdom and he has taught in Australia, Finland, Hong Kong, and the United Kingdom. Professor Warren is a Fellow of the Australian Computer Society.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com