Research Article
BibTex RIS Cite

Analysing the Effects of Cyber Security on National Security from a Realist Perspective: "Stuxnet" Example

Year 2024, , 38 - 51, 28.06.2024
https://doi.org/10.54627/gcd.1443278

Abstract

In this study, the effects of providing cyber security on national security are examined from a realistic perspective using the example of the Stuxnet virus. It has been stated that the increasing complexity of cyber threats due to technological advances poses serious risks to states' national security. In the study, the critical role of cyber security in protecting national security is emphasized through the Stuxnet attack. The Stuxnet attack is a cyber-attack on the facilities where Iran carried out its nuclear enrichment program in 2010. As a result of this attack, it was revealed that Iran had both interruptions in its nuclear program and a weakness in cyber security. As such, it is underlined that cyber security can affect the international balance of power and the strategic interests of states. From a realist perspective, since ensuring national security requires a resilient defense against cyber threats and vulnerabilities, it has become necessary to consider cyber security as an important parameter in determining national security policies. This study reveals the interdependent relationship between cyber security and national security in this age when cyberspace has become a very important arena for power struggles. Considering these reasons, it has been recommended that states, which realists consider the main actor in the international system, should make investments that will support their cyber security to protect their national security.

References

  • Albright, D., Burkhard, S. ve Hannah, J. (2022). “Iran’s Natanz Tunnel Complex: Deeper, Larger than Expected”, Institute For Science and International Security Report, https://isis-online.org/isis-reports/detail/irans-natanz-tunnel-complex-deeper-larger-than-expected/8
  • Al-Rabiaah, S. (2018). The “Stuxnet” Virus of 2010 As an Example of A “APT” and Its “Recent” Variances, 21st Saudi Computer Society National Computer Conference (NCC).
  • Ateş, A. (1996). Milli Güvenlik Siyaseti ve Stratejisi, İstanbul: Harp Akademileri Basım Evi.
  • Baezner, M. ve Robin, P. (2017). Hotspot Analysis: Stuxnet, Zürich: Center for Security Studies (CSS).
  • Baylis, J. (2008). Uluslararası İlişkilerde Güvenlik Kavramı, Uluslararası İlişkiler, 5(18), 69-85. https://dergipark.org.tr/tr/download/article-file/539876
  • Buzan, B. (1983). People, States and Fear: The National Security Problem in International Relations, Brighton, Harvester Books, Chapel Hill, University of North Carolina Press.
  • Cherry, S. ve Langner, R. (2010). How Stuxnet Is Rewriting the Cyberterrorism Playbook, IEEE Spectrum, https://spectrum.ieee.org/podcast/telecom /security/how-stuxnet-is-rewriting-the- cyberterrorism-playbook
  • Collins, A. (2007). Contemporary Security Studies, New York: Oxford University Press.
  • Çakmak, H. ve Demir, C. K. (2009). Siber Dünyadaki Tehdit ve Kavramlar, Haydar Çakmak ve Taner Altunok (Ed.), Suç, Terör ve Savaş Üçgeninde Siber Dünya içinde (s. 23-55), Ankara: Barış Platin Kitabevi.
  • Çifçi, H. (2013). Her Yönüyle Siber Savaş, İstanbul: TÜBİTAK Popüler Bilim Kitapları.
  • Çolak, H. (2011). Siber Terör, Yargılama Usulü ve Önleyici Tedbirler, Kazancı Hakemli Hukuk Dergisi, S. 79-80, 62-142.
  • Falliere, N., Murchu, L. O. ve Chien, E. (2011). W32.Stuxnet Dossier, Symantec Corporation. Erişinm adresi: https://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf
  • Farwell, J. P. ve Rohozinski R. (2011). Stuxnet and the Future of Cyber War, Survival, 53, 23-40. doi: 10.1080/00396338.2011.555586
  • Hatch, B. B. (2018). Defining a Class of Cyber Weapons as WMD: An Examination of the Merits, Journal of Strategic Security, 11(1), 43-61. doi: 10.5038/1944-0472.11.1.1657
  • Internet World Stats. (2023). World Internet Users and Population Stats, https://www.internetworldstats.com/stats.htm
  • Kaspersky, E. (2010). Stuxnet Worm: Facts and Highlights, Kaspersky Lab. https://www.kaspersky.com/about/press-releases/2010_kaspersky-lab-provides-its-insights-on-stuxnet-worm
  • Kimball, J. (2021). Costs of the 20-year war on terror: $8 trillion and 900,000 deaths, https://www.brown.edu/news/2021-09-01/costsofwar
  • LaGrone, S. (2021). Anti-Ship Missiles Top Marines $2.95B Fiscal Year 2022 Wishlist, https://news.usni.org/2021/06/02/anti-ship-missiles-top-marines-2-95b-fiscal-year-2022-wishlist
  • Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy, 9(3), 49-51. doi: 10.1109/MSP.2011.67
  • Lindsay, J. R. (2013). Stuxnet and the Limits of Cyber Warfare, Security Studies, 22, 365-404. doi: 10.1080/09636412.2013.816122
  • Magnolia Pictures. (2016). Zero Days. United States. Retrieved 2016, https://www.imdb.com/title/tt5446858/. (access: 20.05.2023).
  • Malus, K. (2018). From “Atoms for Peace” to “JCPOA”: History of Iranian Nuclear Development, https://k1project.columbia.edu/content/atoms-peace-jcpoa-history-iranian-nuclear-development
  • Moos, J. (2015). Cyber Forensics in a Post Stuxnet World, ITNOW, 57(4), 32-33. doi:10.1093/itnow/bwv100
  • Nakashima, E. ve Warrick, J. (2012). Stuxnet was work of U.S. and Israeli experts, officials say, https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html
  • Pool, P. (2013). War of the Cyber World: The Law of Cyber Warfare, International Lawyer, 47(2), 299-323. https://scholar.smu.edu/cgi/viewcontent.cgi?article=1585&context=til
  • Öğün, M. N. ve Kaya, A. (2013). Siber Güvenliğin Milli Güvenlik Açısından Önemi ve Alınabilecek Tedbirler, Güvenlik Stratejileri Dergisi, 9(18), 145-181. https://dergipark.org.tr/tr/download/article-file/84487
  • Özcan, A. B. (2011). Uluslararası Güvenlik Sorunları ve ABD'nin Güvenlik Stratejileri, Selçuk Üniversitesi İİBF Sosyal ve Ekonomik Araştırmalar Dergisi, 22, 451-470. https://dergipark.org.tr/tr/download/article-file/289003 Reuters. (2014). South Korea To Buy 40 F-35 Jets For $7 Billion, https://www.businessinsider.com/r-south-korea-to-sign-deal-this-month-to-buy-40-f-35-jets-for-7-billion-sources-2014-9
  • Rosenbaum, R. (2012). .Richard Clarke on Who Was Behind the Stuxnet Attack, http://www.smithsonianmag.com/history/richard-clarke-on-who-was-behind-the-stuxnet-attack-160630516/?no-ist
  • Sağıroğlu, Ş. (2018). Siber Güvenlik ve Savunma: Önem, Tanımlar, Unsurlar ve Önlemler, Şeref Sağıroğlu ve Mustafa Alkan (Ed.), Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık içinde (s. 21-45), Ankara: BGD Siber Güvenlik ve Savunma Kitap Serisi.
  • Sancak, K. (2013). Güvenlik Kavramı Etrafındaki Tartışmalar ve Uluslararası Güvenliğin Dönüşümü, KTÜ Sosyal Bilimler Dergisi, 3(6), 123-134. https://www.ktu.edu.tr/dosyalar/sbedergisi_69519.pdf
  • Sanger, D. E. (2013). Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, US: Broadway Books.
  • Stone, A. (1994). What Is a Supranational Constitution? An Essay in International Relations Theory, The Review of Politics, 56(3), 441-473. https://openyls.law.yale.edu/bitstream/handle/20.500.13051/5323/What_is_a_Supranational_Constitution_An_Essay_in_International_Relations_Theory.pdf;jsessionid=070CAFDF7AD6443C416D49CE82DFA9FC?sequence=2
  • The Sydney Morning Herald, Stuxnet mutating, rampaging through Iran, 2010, https://www.smh.com.au/business/stuxnet-mutating-rampaging-through-iran-20100927-15u8o.html
  • Turhan, O.(2006). Bilgisayar Ağları İle İlgili Suçlar (Siber Suçlar), Planlama Uzmanlığı Tezi, Ankara: Devlet Planlama Teşkilatı Müsteşarlığı Hukuk Müşavirliği. http://www.bilgitoplumu.gov.tr/wp-content/uploads/2015/01/Bilgisayar_Aglari_ile_ilgili_Suclar_OguzTurhan.pdf
  • USSF (United States Space Force). (2020). United States Space Force history, https://www.spaceforce.mil/About-Us/About-Space-Force/History/
  • Viotti, P. R. ve Kauppi, M. V. (1993). International Relations Theory: Realism, Pluralism, Globalism, New York: Macmillan Publishing.
  • Yazıcıoğlu, Y. (2002). Bilgisayar Ağları İle İlgili Suçlar Konusunda Türk Ceza Kanunu 2000 Tasarısı, Dokuz Eylül Üniversitesi Uluslararası İnternet Sempozyumu Bildirisi, İzmir, 451-470.
  • ZERODIUM, How to Sell Your Zero-Day (0day) Exploit to ZERODIUM, Zerodium, https://zerodium.com/program.html
  • Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, US: Broadway Books.

Analysing the Effects of Cyber Security on National Security from a Realist Perspective: "Stuxnet" Example

Year 2024, , 38 - 51, 28.06.2024
https://doi.org/10.54627/gcd.1443278

Abstract

Bu çalışmada, siber güvenliğin sağlanmasının ulusal güvenlik üzerindeki etkilerini, realist bakış açısıyla ve Stuxnet virüsü örneği kullanılarak incelenmiştir. Siber tehditlerin, teknolojik ilerlemelere bağlı olarak giderek karmaşık hale gelmesi, devletlerin ulusal güvenliği açısından ciddi riskler barındırdığı ifade edilmiştir. Çalışmada, Stuxnet saldırısı üzerinden, ulusal güvenliğin korunabilmesinde siber güvenliğin kritik rolüne vurgu yapılmıştır. Stuxnet saldırısı, 2010 yılında İran’ın nükleer zenginleştirme programını yürüttüğü tesislere yönelik yapılan bir siber saldırıdır. Bu saldırı sonucunda, İran’ın hem nükleer programında kesintiler yaşanmış hem de siber güvenlik konusunda zafiyet yaşadığı ortaya çıkmıştır. Bu haliyle siber güvenliğin, uluslararası güç dengesini ve devletlerin stratejik çıkarlarını etkileyebileceğinin altı çizilmiştir. Realist bir bakış açısıyla; ulusal güvenliğin sağlanması, siber tehditlere ve zafiyetlere karşı dirençli bir savunma gerektirdiğinden, siber güvenlik konusunun ulusal güvenlik ile ilgili politikaların belirlenmesi sürecinde önemli bir parametre olarak ele alınması bir zorunluluk haline gelmiştir. Bu çalışmada, siber alanın güç mücadeleleri açısından çok önemli bir arena haline geldiği bu çağda, siber güvenlik ve ulusal güvenlik arasındaki karşılıklı bağımlılık ilişkisi ortaya konmuştur. Bu nedenler ışığında; realistlerin uluslararası sistemde ana aktör olarak ele aldıkları devletlerin, ulusal güvenliklerini korumak amacıyla, siber güvenliklerini sağlamalarına destek olacak yatırımları yapmaları gerektiği tavsiye edilmiştir.

References

  • Albright, D., Burkhard, S. ve Hannah, J. (2022). “Iran’s Natanz Tunnel Complex: Deeper, Larger than Expected”, Institute For Science and International Security Report, https://isis-online.org/isis-reports/detail/irans-natanz-tunnel-complex-deeper-larger-than-expected/8
  • Al-Rabiaah, S. (2018). The “Stuxnet” Virus of 2010 As an Example of A “APT” and Its “Recent” Variances, 21st Saudi Computer Society National Computer Conference (NCC).
  • Ateş, A. (1996). Milli Güvenlik Siyaseti ve Stratejisi, İstanbul: Harp Akademileri Basım Evi.
  • Baezner, M. ve Robin, P. (2017). Hotspot Analysis: Stuxnet, Zürich: Center for Security Studies (CSS).
  • Baylis, J. (2008). Uluslararası İlişkilerde Güvenlik Kavramı, Uluslararası İlişkiler, 5(18), 69-85. https://dergipark.org.tr/tr/download/article-file/539876
  • Buzan, B. (1983). People, States and Fear: The National Security Problem in International Relations, Brighton, Harvester Books, Chapel Hill, University of North Carolina Press.
  • Cherry, S. ve Langner, R. (2010). How Stuxnet Is Rewriting the Cyberterrorism Playbook, IEEE Spectrum, https://spectrum.ieee.org/podcast/telecom /security/how-stuxnet-is-rewriting-the- cyberterrorism-playbook
  • Collins, A. (2007). Contemporary Security Studies, New York: Oxford University Press.
  • Çakmak, H. ve Demir, C. K. (2009). Siber Dünyadaki Tehdit ve Kavramlar, Haydar Çakmak ve Taner Altunok (Ed.), Suç, Terör ve Savaş Üçgeninde Siber Dünya içinde (s. 23-55), Ankara: Barış Platin Kitabevi.
  • Çifçi, H. (2013). Her Yönüyle Siber Savaş, İstanbul: TÜBİTAK Popüler Bilim Kitapları.
  • Çolak, H. (2011). Siber Terör, Yargılama Usulü ve Önleyici Tedbirler, Kazancı Hakemli Hukuk Dergisi, S. 79-80, 62-142.
  • Falliere, N., Murchu, L. O. ve Chien, E. (2011). W32.Stuxnet Dossier, Symantec Corporation. Erişinm adresi: https://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf
  • Farwell, J. P. ve Rohozinski R. (2011). Stuxnet and the Future of Cyber War, Survival, 53, 23-40. doi: 10.1080/00396338.2011.555586
  • Hatch, B. B. (2018). Defining a Class of Cyber Weapons as WMD: An Examination of the Merits, Journal of Strategic Security, 11(1), 43-61. doi: 10.5038/1944-0472.11.1.1657
  • Internet World Stats. (2023). World Internet Users and Population Stats, https://www.internetworldstats.com/stats.htm
  • Kaspersky, E. (2010). Stuxnet Worm: Facts and Highlights, Kaspersky Lab. https://www.kaspersky.com/about/press-releases/2010_kaspersky-lab-provides-its-insights-on-stuxnet-worm
  • Kimball, J. (2021). Costs of the 20-year war on terror: $8 trillion and 900,000 deaths, https://www.brown.edu/news/2021-09-01/costsofwar
  • LaGrone, S. (2021). Anti-Ship Missiles Top Marines $2.95B Fiscal Year 2022 Wishlist, https://news.usni.org/2021/06/02/anti-ship-missiles-top-marines-2-95b-fiscal-year-2022-wishlist
  • Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy, 9(3), 49-51. doi: 10.1109/MSP.2011.67
  • Lindsay, J. R. (2013). Stuxnet and the Limits of Cyber Warfare, Security Studies, 22, 365-404. doi: 10.1080/09636412.2013.816122
  • Magnolia Pictures. (2016). Zero Days. United States. Retrieved 2016, https://www.imdb.com/title/tt5446858/. (access: 20.05.2023).
  • Malus, K. (2018). From “Atoms for Peace” to “JCPOA”: History of Iranian Nuclear Development, https://k1project.columbia.edu/content/atoms-peace-jcpoa-history-iranian-nuclear-development
  • Moos, J. (2015). Cyber Forensics in a Post Stuxnet World, ITNOW, 57(4), 32-33. doi:10.1093/itnow/bwv100
  • Nakashima, E. ve Warrick, J. (2012). Stuxnet was work of U.S. and Israeli experts, officials say, https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html
  • Pool, P. (2013). War of the Cyber World: The Law of Cyber Warfare, International Lawyer, 47(2), 299-323. https://scholar.smu.edu/cgi/viewcontent.cgi?article=1585&context=til
  • Öğün, M. N. ve Kaya, A. (2013). Siber Güvenliğin Milli Güvenlik Açısından Önemi ve Alınabilecek Tedbirler, Güvenlik Stratejileri Dergisi, 9(18), 145-181. https://dergipark.org.tr/tr/download/article-file/84487
  • Özcan, A. B. (2011). Uluslararası Güvenlik Sorunları ve ABD'nin Güvenlik Stratejileri, Selçuk Üniversitesi İİBF Sosyal ve Ekonomik Araştırmalar Dergisi, 22, 451-470. https://dergipark.org.tr/tr/download/article-file/289003 Reuters. (2014). South Korea To Buy 40 F-35 Jets For $7 Billion, https://www.businessinsider.com/r-south-korea-to-sign-deal-this-month-to-buy-40-f-35-jets-for-7-billion-sources-2014-9
  • Rosenbaum, R. (2012). .Richard Clarke on Who Was Behind the Stuxnet Attack, http://www.smithsonianmag.com/history/richard-clarke-on-who-was-behind-the-stuxnet-attack-160630516/?no-ist
  • Sağıroğlu, Ş. (2018). Siber Güvenlik ve Savunma: Önem, Tanımlar, Unsurlar ve Önlemler, Şeref Sağıroğlu ve Mustafa Alkan (Ed.), Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık içinde (s. 21-45), Ankara: BGD Siber Güvenlik ve Savunma Kitap Serisi.
  • Sancak, K. (2013). Güvenlik Kavramı Etrafındaki Tartışmalar ve Uluslararası Güvenliğin Dönüşümü, KTÜ Sosyal Bilimler Dergisi, 3(6), 123-134. https://www.ktu.edu.tr/dosyalar/sbedergisi_69519.pdf
  • Sanger, D. E. (2013). Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, US: Broadway Books.
  • Stone, A. (1994). What Is a Supranational Constitution? An Essay in International Relations Theory, The Review of Politics, 56(3), 441-473. https://openyls.law.yale.edu/bitstream/handle/20.500.13051/5323/What_is_a_Supranational_Constitution_An_Essay_in_International_Relations_Theory.pdf;jsessionid=070CAFDF7AD6443C416D49CE82DFA9FC?sequence=2
  • The Sydney Morning Herald, Stuxnet mutating, rampaging through Iran, 2010, https://www.smh.com.au/business/stuxnet-mutating-rampaging-through-iran-20100927-15u8o.html
  • Turhan, O.(2006). Bilgisayar Ağları İle İlgili Suçlar (Siber Suçlar), Planlama Uzmanlığı Tezi, Ankara: Devlet Planlama Teşkilatı Müsteşarlığı Hukuk Müşavirliği. http://www.bilgitoplumu.gov.tr/wp-content/uploads/2015/01/Bilgisayar_Aglari_ile_ilgili_Suclar_OguzTurhan.pdf
  • USSF (United States Space Force). (2020). United States Space Force history, https://www.spaceforce.mil/About-Us/About-Space-Force/History/
  • Viotti, P. R. ve Kauppi, M. V. (1993). International Relations Theory: Realism, Pluralism, Globalism, New York: Macmillan Publishing.
  • Yazıcıoğlu, Y. (2002). Bilgisayar Ağları İle İlgili Suçlar Konusunda Türk Ceza Kanunu 2000 Tasarısı, Dokuz Eylül Üniversitesi Uluslararası İnternet Sempozyumu Bildirisi, İzmir, 451-470.
  • ZERODIUM, How to Sell Your Zero-Day (0day) Exploit to ZERODIUM, Zerodium, https://zerodium.com/program.html
  • Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, US: Broadway Books.
There are 39 citations in total.

Details

Primary Language English
Subjects International Security
Journal Section Research Articles
Authors

Şeref Çetinkaya 0000-0002-6446-2322

Sami Terzi 0009-0004-1316-3324

Publication Date June 28, 2024
Submission Date February 26, 2024
Acceptance Date June 14, 2024
Published in Issue Year 2024

Cite

APA Çetinkaya, Ş., & Terzi, S. (2024). Analysing the Effects of Cyber Security on National Security from a Realist Perspective: "Stuxnet" Example. Güvenlik Çalışmaları Dergisi, 26(1), 38-51. https://doi.org/10.54627/gcd.1443278