Analysis of Threat Perceptions: NATO and Türkiye’s Cyber Terrorism Policies

Автор: literator от 10-08-2025, 05:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Analysis of Threat Perceptions: NATO and Türkiye’s Cyber Terrorism Policies
Автор: Mehmet Emin Erendor
Издательство: CRC Press
Год: 2026
Страниц: 203
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country’s economy, politics, and security. However, despite this series of cyberattacks, the North Atlantic Treaty Organization (NATO) did not apply Article 5 of the North Atlantic Treaty due to lack of consensus on applying Article 5 in the Estonian case. Although various approaches have been developed by scholars, there is no common application of international law in the United Nations Charter regarding cyber threats or attacks. Moreover, while there has been no common definition of "cyber terrorism" by the international community, some scholars regard "cyberattacks" as acts of war. There is a paucity of literature dealing with the application of international law on cyber threats. A new Strategic Concept was adopted in 2010. Its most important development was to identify the significance of cyber threats to all NATO member bodies.

When updating its own technology, the organization needs to be ready to defend itself against all kinds of asymmetrical warfare, whether from within or beyond its operational range. However, the terms of Article 5 of the North Atlantic Treaty were imprecise as to whether cyberattacks can be regarded as a form of threat; for this reason, NATO accepted the case‑by‑case concept on cyber threats/attacks in terms of the application of Article 5 by the Wales Summit in 2014. Despite the fact that the Charter of the United Nations has not been revised, if its articles are broadly evaluated, cyberattacks would be accepted as a threat or use of force against the territorial integrity of a state.

Nowadays, since the international community is literally run on technology (i.e. information technologies), terrorists can use technology in order to threaten society’s networked information systems. For example, terrorists can use the Internet and information technologies for achieving specific aims, such as political and economic destabilization, financing their organization, transmitting child pornography, or promoting their own propaganda and ideologies. Their main aims may be to create fear in society and harm the critical national infrastructures of any state or international organization. The Internet is the best way for terrorist organizations to spread their propaganda. This is because nowadays many people have access to the Internet, and terrorists can reach them by explaining their ideologies in chat groups or on websites. Also, terrorists are able to steal identity and credit card information in order to finance their organizations.

Cybercrime can be considered a major threat to the international community. The introduction, expansion, and consumption of information technologies have correlated with an increase in cybercriminal activities. Regarding cyberspace, the Internet is used more and more as a medium for well-managed criminal organizations. Indeed, terrorists often achieve their aims by using the Internet and other information systems. In accordance with recent research, cybercrimes differ from terrestrial crimes in four different ways: “They are easy to learn how to commit; they require few resources relative to the potential damage caused; they can be committed in a jurisdiction without being physically present in it; and they are often not clearly illegal”. To access the Internet, a certain amount of hacking and programming was necessary, which resulted in the true beginnings of cybercrime. Soon afterwards, “unauthorized access”, “denial of service” (DoS) attacks, cyber terrorism, cyber stalking, identity theft, and phishing came into existence. As cybercrimes pose complicated socio-economic, legal, and security dilemmas, the international community has sought, during the last few years, to adopt a set of international and regional measures — namely, the creation of a communications network for sharing information about these crimes. On this basis, new forms of cybercrime present new problems to lawmakers and international organizations.

Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber-terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyber-terrorism, depending on their impact. Attacks that disrupt non-essential services or that are mainly a costly nuisance would not.

The main purpose of this book is to analyze and evaluate what has been carried out regarding NATO’s operational arrangements and its cyber defense approach and, secondly, to explain this through the lens of Game Theory. Furthermore, it will demonstrate why the web is paramount to NATO’s system‑driven operations, and why it requires a cyber defense arrangement. In particular, the research presented here will analyze Türkiye in this regard. The cyberattack on Estonia in 2007 will be used by way of a case study to explain the development of threat perceptions, risks, international law, cybersecurity policies and application of Game Theory.

Скачать Analysis of Threat Perceptions: NATO and Türkiye’s Cyber Terrorism Policies

Сбор на сервер (обновляется раз в сутки)

0%

Собрано 0 ₽ из 75000 ₽




ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.