More details
Hide details
The War College of the Armed Forces of the Republic of Azerbaijan, Azerbaijan
A - Research concept and design; B - Collection and/or assembly of data; C - Data analysis and interpretation; D - Writing the article; E - Critical revision of the article; F - Final approval of article
Publication date: 2022-03-30
Corresponding author

The War College of the Armed Forces of the Republic of Azerbaijan, Kara Karaev avenue 22. Flat 9, AZ 1060, Baku, Azerbaijan
SBN 2022;23(1): 19-26
In the context of integration into modern information technologies, the state, society, business structures and individuals face critical challenges in the field of information and its authenticity in cyberspace, secure use of electronic services, protection of personal data, data completeness and confidentiality. In an environment where new cyber threats are constantly emerging and evolving, it is important for countries to have flexible, operational cybersecurity strategies against global cyber threats. In the modern era, cyberattacks and cyber defense are considered as an integral part of all operations. At present, no military operation is carried out without a cyber element. However, very few countries are able to respond to such attacks with state resources . Today, the issue of cybersecurity is considered one of the priorities. Every year, governmental, non-governmental and international organizations hold various events in this area at the regional and global levels. As it is seen, cybersecurity is a very broad and urgent problem. The Azerbaijani state has taken appropriate steps to assess the existing gaps and threats in this area in a timely manner and will continue to work with great determination . Currently, the number of cyberattacks and cyber-espionage against government agencies and private companies is growing rapidly. The consequences of well-planned and successful cyberattacks targeting interconnected and dependent information infrastructure can be devastating. Cybersecurity and privacy of personal information is becoming a strategic national issue affecting all levels of society. Therefore, cybersecurity becomes a necessary condition for the development of the information society. Each state has a different approach to cybersecurity, there are such views on cybersecurity as information security, the issue of national security, the issue of law enforcement agencies and the economic issue. Although all countries recognize the importance of international cooperation in the field of cybersecurity, the lack of a common language and approach complicates the process of international cooperation. Therefore, the partnership and cooperation of countries in the field of cybersecurity is vital. Provision of reliable cybersecurity is beyond the access of small states independently, and solving this problem requires the partnership and cooperation of all interested parties - states, law enforcement agencies, the private sector and citizens. The cross-border nature of cyber threats encourages countries to work closely together in the field of cybersecurity. Nowadays, the issue of cybersecurity is becoming a national strategic problem and affects all sectors of society. Fast, efficient and effective fight against cyber threats requires the definition of the right strategic goals. The development of a national cybersecurity strategy is the first and main step in the fight against cyber threats. To develop a successful and optimal national cybersecurity strategy, available national cybersecurity strategies should be analyzed and successful practices against cyber threats should be used.
Hasanov, A.H. (2106). Factors determining the importance of creating a cyber army in the Armed Forces of the Republic of Azerbaijan. National Security and Military Sciences, No. 2.
Hasanov A.H., Iskandarov X.I. (2017). NATO’s Cybersecurity Policy and Azerbaijan. National Security and Military Sciences, Baku, No 2 (3).
Imamverdiyev Y.N. (2013). Analysis of national cybersecurity strategies, “I Republican scientific- -practical conference on information security problems” dedicated to the 90th anniversary of the national leader of the Azerbaijani people Heydar Aliyev, May 17-18, p. 14-17.
Sood A.K., Enbody R.J. (2013). Targeted cyberattacks: a superset of advanced persistent threats / IEEE Security & Privacy, 2013, Vol. 11, No. 1.
Luiijf H., Besseling K., Spoelstra M., de Graaf P. (2011) Ten national cyber security strategies: a comparison. Proc. 6th International Conference on Critical Information Infrastructures Security (CRITIS 2011), September.
US Government Accountability Office. (2009) National cybersecurity strategy: Key Improvements are Needed to Strengthen the Nation’s Posture, GAO-09-432T.
Mitra A., Schwartz R.L., From cyber space to cybernetic space: rethinking the relationship between real and virtual spaces // Journal of Computer-Mediated Communication’s, 2001, Vol. 7, No. 1. [access: 11.02.2022].
National Audit Office. (2013). The UK cyber security strategy: Landscape review, February.
ENISA. (2012). National cyber security strategies: Setting the course for national efforts to strengthen security in cyberspace.
Chałubińska-Jentkiewicz K., Radoniewicz F., Zieliński T. (2022). Cybersecurity in Poland Legal Aspects.
Ministry of Digital Affairs (2019). Cybersecurıty Strategy of The Republıc of Poland for 2019-2024, [access: 11.02.2022].
Resmi Gazete (2013). National Cyber Security Strategy and Action Plan for 2013-2014. www. [access: 11.02.2022].
Klimburg, A. (Ed.) (2012). National cyber security framework manual, NATO CCD COE Publication,Tallinn.
Journals System - logo
Scroll to top