Challenges of countering cyber terrorism in the hybrid war contexts

2019-10-15
This conference paper seeks to explore the characteristics of cyber terrorism and challenges of countering cyber terrorism in the hybrid war contexts. This conference paper also intends to highlight the difficulties of coping with the terrorist uses of the cyber space and social media when the perpetrators of cyber terrorist acts remain anonymous and the parties of hybrid warfare adhere to the principle of deniability constantly The conference paper puts forward the argument that the concept of cyber terrorism should be defined strictly in the narrow sense that emphasizes the illegal politically motivated manipulations of the cyber space and social media rather than the broader sense that emphasizes all unauthorized acts and breaches of cyber norms, which may not necessarily involve any political motivation or intention to serve the hybrid warfare strategies of combatants. Moreover, the conference paper also demonstrates that the sustainaility and resilience of cyber security solutions necessitate the readiness to cope with the cyber warfare settings if and when cyber terrorist attacks take place in the hybrid warfare contexts in which various forms of war including cyber warfare and cyber terrorism are utilized in order to achieve political objectives covertly. The conference paper starts with exploring the conceptual problems in the broader definitions of cyber terrorism as well as clarifying the definition of hybrid warfare concept through a general literature review. Afterwards, the conference paper demonstates the characteristics of cyber terrorism in the hybrid warfare contexts. Next, the conference paper identifies the challenges of countering cyber terrorism when cyber attacks take the form of cyber warfare as part of a broader hybrid warfare strategy of achieving political objectives covertly. The conference paper concludes with a concise discussion of the theoretical and policy-relevant implications of the trends in cyber terrorism and hybrid warfare for security studies in international relations discipline.
XI. Uludağ Congress on International Relations, 14 - 15 Ekim 2019

Suggestions

Citadel: Cyber threat intelligence assisted defense system for software-defined networks
Yürekten, Özgür; Demirci, Mehmet (2021-05-22)
Defending networks is becoming more challenging due to the growing number and variety of cyber threats. On the other hand, network security professionals have new technologies and tools at their disposal. This paper focuses on a few of these technologies and investigates new ways to take advantage of them. To this end, we present Citadel, a novel security system utilizing cyber threat intelligence (CTI) to construct automated defense solutions in software-defined networking (SDN) environments. Citadel also ...
Cyber threat intelligence sharing technologies and threat sharing model using blockchain
Özdemir, Ahmet; Acar, Aybar Can; Özgit, Attila; Department of Cybersecurity (2021-5-7)
Against the measures taken, the nature of the threats in the cyber environment is evolving day by day. While script kiddie made amateur cyber attacks were usually experienced beforehand, more sophisticated and targeted attacks are frequently encountered nowadays. Besides that, commonly used signature based techniques for attack detection and threat information staying within organization is insufficient for dynamically changing, organized and targeted threats. Furthermore, with the advance of new technolog...
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework
Sengul, Zafer; Acartürk, Cengiz (2021-01-01)
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer netw...
Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Nato and the fight against transnational terrorism: 2001-2010
Yıldırım, Yeşim; Tanrısever, Oktay Fırat; Department of International Relations (2010)
This thesis analyzes the evolution of the policies, strategies and actions of NATO within the context of the fight against transnational terrorism. The thesis focuses on the post 9/11 period. After the 9/11 events, the security perceptions of NATO changed dramatically and the threat of transnational terrorism emerged as a prominent challenge to the security of all members of NATO so the fight against terrorism became a key priority for NATO. Consequently, the NATO experienced a significant transformation si...
Citation Formats
O. F. Tanrısever, “ Challenges of countering cyber terrorism in the hybrid war contexts,” Bursa, Türkiye, 2019, p. 371, Accessed: 00, 2021. [Online]. Available: https://cdn-cms.f-static.net/uploads/2415508/normal_5e0a3e3a756f8.pdf.