Araştırma Makalesi
BibTex RIS Kaynak Göster

Uluslararası Güvenlikte Siber Tehditlerin Yükselişi ve Stratejik Savunma Politikaları

Yıl 2025, Cilt: 24 Sayı: 1, 1 - 20, 29.01.2025
https://doi.org/10.17755/esosder.1459973

Öz

Bu çalışma, uluslararası güvenlik alanındaki siber tehditlerin karmaşık yapısını incelemekte ve bu tehditlerin küresel istikrar için temel bir endişe olarak hızlı yükselişini vurgulamayı amaçlamaktadır. İlk bölüm, siber tehditlerin evrimine ilişkin özlü bir genel bakış sunmakta, bu tehditlerin kökenlerini küçük dijital rahatsızlıklardan ulusal güvenliği baltalayabilen, kritik altyapıyı kesintiye uğratabilen ve jeopolitik dinamikleri etkileyebilen sofistike araçlara kadar izlemektedir. Bu bölüm, siber operasyonların casusluk ve sabotajın gölgelerinden ulusal savunma cephaneliklerinde ön saflardaki araçlara geçişini işaret eden önemli olayları öne çıkarmaktadır. İnceleme, bu tehditlerin çok yönlü doğasını, devlet destekli saldırılar, siber terörizm ve siber suç dahil olmak üzere, her biri uluslararası barış ve güvenliğe benzersiz zorluklar sunan alanları kapsamaktadır. Sonraki bölüm, artan siber tehdit manzarasına yanıt olarak uluslar ve uluslararası organlar tarafından formüle edilen stratejik savunma politikalarının kapsamlı bir özetini sunmaktadır. Ulusal siber güvenlik çerçevelerinin geliştirilmesinden adanmış siber komuta birimlerinin kurulmasına, Birleşmiş Milletler ve NATO gibi örgütlerin himayesinde uluslararası işbirlikleri ve norm belirleme çabalarına kadar benimsenen strateji spektrumu incelenmektedir. Tartışma, bu politikaların siber riskleri hafifletmede, direnci artırmada ve dijital çağda işbirlikçi bir uluslararası güvenlik ortamını teşvik etmede etkililiğini yansıtmaktadır. Uluslararası İlişkilerden teorik içgörüler ile siber olaylar ve politika yanıtları üzerine ampirik verilerin entegrasyonu yoluyla, çalışma, ulusal savunma önlemlerini uluslararası işbirliği zorunluluğu ile uyumlu hale getirmede ortaya çıkan eğilimleri ve gelecekteki zorlukları belirleyerek sonuçlanmakta ve siber sınırı etkili bir şekilde yönlendirmek için uyarlanabilir ve ileriye dönük politikalara duyulan ihtiyacı vurgulamaktadır.

Kaynakça

  • Abbate J, 1999 Inventing the Internet (MIT Press, Cambridge, MA)
  • Adegbite, A.O., Akinwolemiwa, D.I., Uwaoma.P.U., Kaggwa, S.., Akindote O.J., Dawodu,S.O., (2023).Review of cybersecurity strategies in protecting national infrastructure: perspectives from the usa. Computer science & IT research journal, 4(3), 200-219.
  • Andrey, S. (2023). Russia's participation in multistakeholder diplomacy for cybersecurity norms. Building an International Cybersecurity Regime, (Ed.)Ian Johnstone, Arun Sukumar and Joel Trachtman, Monograph Book,
  • Apruzzese, G., Laskov, P., Montes de Oca, E., Mallouli, W., Brdalo Rapa, L., Grammatopoulos, A. V., & Di Franco, F. (2023). The role of machine learning in cybersecurity. Digital Threats: Research and Practice, 4(1), 1-38.
  • Archick. K. (2005). Cybercrime: The Council of Europe Convention, Law, Political Science, Computer Science, Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228.
  • Buchanan, B. (2016). The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations. Oxford University Press.
  • Buchanan, B. (2020). The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics. Harvard University Press.
  • Burton, J., (2015). NATO’s cyber defence: strategic challenges and institutional adaptation, Defence Studies, 15/4, Routledge, 297-319.
  • Chen, L., Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., ... & Smith-Tone, D. (2016). Report on post-quantum cryptography (Vol. 12). Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology.
  • Chesterman, S. (2020). Artificial intelligence and the limits of legal personality. International & Comparative Law Quarterly, 69(4), 819-844.
  • Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins.
  • Clarke, R. A., & Knake, R. K. (2019). The Fifth Domain: Defending our country, our companies, and ourselves in the age of cyber threats. Penguin Press.
  • Clough, J. (2012). The Council of Europe Convention on Cybercrime: Defining `Crime’ in a Digital World. Crim Law Forum 23, 363–391 .
  • Council of Europe. (2001). Convention on Cybercrime.
  • Creemers, R. (2023). 6. The Chinese Conception of Cybersecurity: A Conceptual, Institutional and Regulatory Genealogy. Journal of Contemporary China, 33(146), 173–188.
  • Cybersecurity Law of the People’s Republic of China. (2017). National People’s Congress of the People’s Republic of China.
  • Cybersecurity, C. I. (2018). Framework for improving critical infrastructure cybersecurity. URL: https://nvlpubs. nist. gov/nistpubs/CSWP/NIST. CSWP, 4162018.
  • Cybersecurity, U. S. (2021). Infrastructure Security Agency (CISA). GE Aestiva and Aespire Anesthesia (Update A). https://us-cert. cisa. gov/ics/advisories/icsma-19-190-01.
  • François, Delerue. (2019). Attribution to State of Cyber Operations Conducted by Non-State Actors.
  • Denning, D. E. (2011). Cyber conflict as an emergent social phenomenon. In Corporate hacking and technology-driven crime: Social dynamics and implications, IGI Global, 170-186.
  • European Union Agency for Cybersecurity (ENISA). (2020). ENISA Threat Landscape 2020.
  • Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23-40.
  • Floridi, L., & Taddeo, M. (2016). What is data ethics?. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083), 20160360.
  • Ferenț, D.A & Preja, C. (2023), NATO’s involvement in cyber defence, Intelligence Info, 2(1), 189-193.
  • Gercke, M. (2012). Hard And Soft Law Options in Response to Cybercrime: How to weave a more effective net of global responses. Computer law review international, 13(3), 78-87.
  • Healey, J. (2012). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.
  • Henderson, C. (2015). "The United Nations and the regulation of cyber-security," Chapters, in: Research Handbook on International Law and Cyberspace, chapter 22, 465-490.
  • Jason, D. J. (2019). Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law.
  • Karnouskos, S. (2011). Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society, 4490-4494.
  • Kello, L. (2017). The Virtual Weapon and International Order. Yale University Press.
  • Keohane, R. O., & Nye Jr, J. S. (1998). Power and interdependence in the information age. Foreign Aff., 77- 81-94.
  • Lin, H. (2016). Attribution of malicious cyber incidents: from soup to nuts. Journal of International Affairs, 70(1), 75-137.
  • Lin, H. (2017). Cyber Conflict and International Humanitarian Law. International Review of the Red Cross, 94(886), 515-531.
  • Luitel, P. (2024). Role of Non-State Actors in National Security. Unity journal, Vol.5, 57-75.
  • Lucas, G. R. (2017). Ethics and cyber warfare: the quest for responsible security in the age of digital warfare. Oxford University Press.
  • Margulies, P. (2013). Sovereignty and cyber attacks: Technology's challenge to the law of state responsibility. Melbourne Journal of International Law, 155(14), 496-522.
  • Mearsheimer, J. J. (2014). The Tragedy of Great Power Politics. Updated Edition. W. W. Norton & Company.
  • Mittelstadt, B. (2019). AI ethics – too principled to fail? SSRN Electronic Journal.
  • Mosca, M. (2018). Cybersecurity in an era with quantum computers: Will we be ready?. IEEE Security & Privacy, 16(5), 38-41.
  • Muzhanova. T., Lehominova, S., Shchavinsky, Y., Yakymenko, Y., (2024). Main approaches and directions of development of european union cyber security policy, Cybersecurity Education Science Technique, 4(24), 133-149.
  • NATO. (2016). Warsaw Summit Communiqué. NATO Official Website
  • Nye, J. S. (2010). Cyber Power, Cambridge: Harvard Kennedy School, Belfer Center for Science and International Affairs, 1-24.
  • Nye Jr, J. S. (2016). Deterrence and dissuasion in cyberspace. International security, 41(3), 44-71.
  • Paris Peace Forum. (2018). Paris Call for Trust and Security in Cyberspace.
  • Pauletto.C. (2020). Information and telecommunications diplomacy in the context of international security at the United Nations. Transforming Government: People, Process and Policy, 14(3), 351-380.
  • Proakis, J. G. (2008). Digital Communications. McGraw-Hill, Higher Education.
  • Renda, K. (2022). The development of eu cybersecurity policy: from a coordinating actor to a cy ber power?. Ankara Avrupa çalışmaları dergisi, 21 (2), 467-495.
  • Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5-32.
  • Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1-2), 4-37.
  • Romagna, M. (2020). Hacktivism: Conceptualization, Techniques, and Historical View. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan. Satyanarayanan, M. (2017). The emergence of edge computing. Computer, 50(1), 30-39.
  • Schmitt, M. N. (Ed.). (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press.
  • Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. PublicAffairs.
  • Shemakov, R. (2019). The Morris Worm: Cyber Security, Viral Contagions, and National Sovereignty.
  • Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
  • Singer, P. W. (2015). Stuxnet and its hidden lessons on the ethics of cyberweapons. Case W. Res. J. Int’l L., 47, 79.
  • Stepanova, M.N. (2024). Information security in the legal field: strategies for legal regulation and protection of cyberspace. Law Research Journal, 1(2), 91-101.
  • Sujayraj, S. (2019). Classification of Cyber Attacks and its Associated Laws. Journal of emerging technologies and innovative research, 6(2), 289-298.
  • Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race. Nature, 556, 296-298.
  • Taylor, L., Floridi, L., & Van der Sloot, B. (Eds.). (2016). Group privacy: New challenges of data technologies, Vol. 126. Springer.
  • Tikk, E., Kaska, K., & Vihul, L. (2010). “International Cyber Incidents: Legal Considerations”. NATO Cooperative Cyber Defence Centre of Excellence.
  • United Nations General Assembly. (2015). Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.
  • Valeriano, B., & Maness, R. C. (2018). Cyber War versus Cyber Realities: Cyber Conflict in the International System. Oxford University Press.
  • Waqas, A. (2024). Digital Terrorism: The Emerging Threat of Behavioral Manipulation in the Digital Age. Journal of Digitainability, Realism & Mastery,
  • Walker S, Tennant I. (2023). Cybercrime, the United Nations, Prospects, and Challenges for International Co-operation. In: Ishikawa T, Kryvoi Y, eds. Public and Private Governance of Cybersecurity: Challenges and Potential. Cambridge University Press, 69-102.
  • Wendt, A. (1992). “Anarchy is What States Make of It: The Social Construction of Power Politics”. International Organization, 46(2), 391-425.
  • Zhu, L. & Chen, W. (2022). 5. Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Co-existence. Baltic yearbook of international law,
Toplam 66 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Uluslararası İlişkiler (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Gülşah Özdemir 0000-0001-8900-2560

Yayımlanma Tarihi 29 Ocak 2025
Gönderilme Tarihi 27 Mart 2024
Kabul Tarihi 30 Ekim 2024
Yayımlandığı Sayı Yıl 2025 Cilt: 24 Sayı: 1

Kaynak Göster

APA Özdemir, G. (2025). Uluslararası Güvenlikte Siber Tehditlerin Yükselişi ve Stratejik Savunma Politikaları. Elektronik Sosyal Bilimler Dergisi, 24(1), 1-20. https://doi.org/10.17755/esosder.1459973

   21765     

Elektronik Sosyal Bilimler Dergisi (Electronic Journal of Social Sciences), Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı ile lisanslanmıştır.

ESBD Elektronik Sosyal Bilimler Dergisi (Electronic Journal of Social Sciences), Türk Patent ve Marka Kurumu tarafından tescil edilmiştir. Marka No:2011/119849.