Cyberterrorism as a threat to the cyber security of Ukraine: A discussion of theoretical aspects

Keywords: cyber security, cyberspace, cyberterrorism, information terrorism, Cyber Command.


In this article, the authors analyze cyberterrorism as a threat to Ukraine's cyber security. The urgency of the issue declared in the paper is conditioned by the fact that fair number of terrorist acts intende to make harm to the interests of the state, can be committed today both in real world and in cyberspace. As such acts are committed using computer systems and are done in cyberspace, authors propose to define this type of socially dangerous acts as «cyberterrorism». The methodological basis of this study is a set of philosophical, general scientific, special scientific and other methods that are directly applied in legal researches. The authors have done the interpretation of terms making up the conceptual and categorical apparatus of the subject of research. The difference between information terrorism and cyberterrorism has been substantiated by the writers. The emphasis was placed on the necessity to create a Cyber Command that could react fast to challenges in the information security sphere of the state, including acts of cyberterrorism.


Download data is not yet available.

Author Biographies

Ihor Diorditsa, Kyiv National University of Technologies and Design, Ukraine.

Prof., DSc, Kyiv National University of Technologies and Design, Ukraine.

Kateryna Katerynchuk, Kyiv National University of Technologies and Design, Ukraine.

Prof., DSc, Kyiv National University of Technologies and Design, Ukraine.

Armenui Telestakova, Kyiv National University of Technologies and Design, Ukraine.

Associate Prof., PhD, Kyiv National University of Technologies and Design, Ukraine.

Nataliia Kulak, Kyiv National University of Technologies and Design, Ukraine.

Associate Prof., PhD, Kyiv National University of Technologies and Design, Ukraine.

Andrii Nastiuk, Academy of Labor, Social Relations and Tourism, Ukraine.

Associate Prof., PhD, Academy of Labor, Social Relations and Tourism, Ukraine.


Berner, S. (2003). Cyber-Terrorism: Reality or Paranoia? South African Journal of Information Management, 5(1), pp. 1-4. DOI: 10.4102/sajim.v5i1.208

Boeckmann, R. & Turpin-Petrosino, C. (2002). Understanding the Harm of Hate Crime. Journal of Social Issues, 58(2), pp. 207-225. DOI: 10.1111/1540-4560.00257

Budhijanto, D. (2019). The Virtual Jurisdiction to Combating Cyberterrorism in Indonesia. Central European Journal of International and Security Studies. Issue 12(4), pp. 61–80. Retrieved from

Burayachok, V.L., Tolubko, V.B., Khoroshko, V. O. & Tolyupa S.V. (2015). Information security and cyber security: sociotechnical aspect. Kyiv: DUT, 288 p. Retrieved from

Cavelty, M.D. (2007). Cyber-Terror – Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics, 4(1),

Cavelty, M.D. (2018). Cybersecurity Research Meets Science and Technology Studies. Politics and Governance, 6(2), pp. 22-30. DOI:

Cohen-Almagor, R. (2005). Media Coverage of Acts of Terrorism: Troubling Episodes and Suggested Guidelines. Canadian Journal of Communication, 30(3), pp.383-409.

Cyber Policy Center (2021). Clubhouse in China: Is the data safe? Stanford Internet Observatory. Retrieved from (accessed February 12, 2021).

Decree of the President of Ukraine No. 230/2013. Concept of Combating Terrorism. Verkhovna Rada of Ukraine, April 25, 2013. Retrieved from

Diorditsa, I.V. (2018). Cyber security policy of Ukraine: status and priority areas of implementation: monograph. Zaporizhzhya: Helvetica Publishing House, 548 p.

Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR) relevant theory? International Political Science Review, 27(3), pp. 221–244.

Foros, G.V., Foros, A.V. (2010). Information terrorism as a threat to the national security of Ukraine. Constitutional state, No. 12, pp. 256–261.

Furnell, S.M. and Warren, M.J. (1999). Computer hacking and cyber terrorism: The real threats in the new millennium? Computers and Security, 18(1), pp. 28-34.

Hryzchuk, V.K. (2011). Terrorism: theoretic and applied aspects. Lviv: Lviv DUVS, 328 p.

Iatsyk, T.P. (2014). Specific features of the information terrorism as one of the methods of information war. НScientific bulletin of the National University of the State Tax Service of Ukraine (economics, jurisprudence), No. 2, pp. 55–60.

Ieroshenko, O. (2012). Explanatory Dictionary of the Modern Ukrainian language. Donetsk: Gloriya Trade, p. 282.

Kondratiev, Ia.Iu, et al. (2004). Detection and investigation of crimes committed in information technology field. Kyiv: Palyvoda A. V., 144 p.

Kubyshkin, O.V. (2002). International-legal issues of the state information security arrangements (Doctoral thesis). Moscow State Law Academy, Moscow. Retrieved from

Lux, M.Y. (2018). Defining cyberterrorism. Revista Chilena de Derecho y Tecnología, 7(2), pp. 5-25.

Law of Ukraine No. 638-IV. On Counter Terrorism. Verkhovna Rada of Ukraine, March 20, 2003. Retrieved from

Law of Ukraine No. 2163-VIII. On Basic Principles of Cyber Security of Ukraine. Verkhovna Rada of Ukraine, October 5, 2017. Retrieved from

Law of Ukraine No. 2289-IV. On Amendments to the Criminal and Criminal and Procedure Codes of Ukraine. Verkhovna Rada of Ukraine, December 23, 2004. Retrieved from

Lee, J. & Macdonald, S. (2015). What Is Cyberterrorism? Findings from a Survey of Researchers. Terrorism and Political Violence, 27(4). DOI: 10.1080/09546553.2013.847827

Lee, Jarvis, Macdonald, S. & Nouri, L. (2014). The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism, 37(1), pp. 68-90, DOI: 10.1080/1057610X.2014.853603

Lewis, J.A (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies. Retrieved from

Lipkan, V. (2008). Administrative law basis of ensuring national security of Ukraine. (Doctoral thesis). Kyiv National University of Internal Affairs, Kyiv. Retrieved from

Lipkan, V.A., Maksimenko Yu.E., Zhelikhovsky V.M. (2006). Information Security of Ukraine in the Conditions of European Integration. Kyiv: CST, 280 p. Retrieved from

Lipkan, V., Baskakov V. (2011). Protection of information with limited access in the fight against organized crime. Fight against organized crime and corruption (theory and practice), Vol. 24, pp. 263-269. Retrieved from

Makarenko, Ie. A. (2011). International cooperation in the field of information security: regional context. Actual problems of international relations, 24(1), pp. 51-62. Retrieved from

Mason, O.J., Stevenson, C., & Freedman, F. (2014). Ever-present threats from information technology: The Cyber-Paranoia and Fear Scale. Frontiers in Psychology.

Ministry of Foreign Affairs of Japan (2000). Okinawa Charter on Global Information Society. G8 Kyushu-Okinawa Summit Meeting 2000, Kyushu-Okinawa Japan. Retrieved from

Pašagić, A. (2020). Failed States and Terrorism: Justifiability of Transnational Interventions from a Counterterrorism Perspective. Perspectives on Terrorism, 14(3), pp. 19-28. Retrieved from

Poteriakhina, I.S. (March, 2012). Role of cyberterrorism in the current international relations. In K. Balabanov of the President of the Conference, Trends in the development of the modern system of international relations and the world political process. Conference led by Mariupol State University, Mariupol, Ukraine. pp. 37-40. Retrieved from

Shelomentsev, V.P. (2012). The essence of organizational support of the cyber security system of Ukraine and the ways to improve it. Fight against organized crime and corruption (theory and practice), No. 2(28), pp. 299–309.

Shyrokova-Murarash, O. G., & Akchurin, Yu. R. (2011). Cybercrime and cyberterrorism as the threats to the global information security: international and legal aspect. Information and law, No. 1, pp. 76–81.

Sokur, S. (2010). Forming common EU security and defense policy in the context of fighting against modern cyberterrorism. Viche. No. 10, pp. 24-27. Retrieved from

Tafoya, W. L. (2011). Cyber Terror. FBI Law Enforcement Bulletin. Retrieved from

Topchiy, V.V. (2015). Cyber terrorism in Ukraine: concept and prevention by criminal and legal and criminological means. Scientific bulletin of Kherson State University. Series: Legal science, Issue 6, pp. 65-68. Retrieved from

Vilić, V.M. (2017). Dark web, cyber terrorisam and cyber warfare: dark side of the cyberspace. Balkan Social Science Review, Vol. 10, pp. 7-25. Retrieved from

Weimann, G. (2004). Cyberterrorism: How Real is the Threat? United States Institute of Peace. Retrieved from (accessed 02 March 2021), p. 6.

Zelenkov, M.Y., Ponomarev, V.G., Gusev, V.V., Andreev, A.N., & Makarov, O.N. (2020). Identification of Advertising Trends in the Mass Media and On the Internet Used by Modern Terrorism. Cuestiones Políticas, 37(65), pp. 382-398. DOI:

Zulhuda, S. (2020). The threat of cyberterrorism and the applicability of the convention of cybercrime. At Tahalof (Terrorism in International Law), 3, pp. 20-23. Retrieved from
How to Cite
Diorditsa, I., Katerynchuk, K., Telestakova, A., Kulak, N., & Nastiuk, A. (2021). Cyberterrorism as a threat to the cyber security of Ukraine: A discussion of theoretical aspects. Amazonia Investiga, 10(40), 73-83.