Araştırma Makalesi
BibTex RIS Kaynak Göster

From Bombs to Bytes: Role of Cyber Security in National Security and Importance of Artificial Intelligence in Cyber Security

Yıl 2023, Cilt: 6 Sayı: 1, 173 - 188, 31.03.2023
https://doi.org/10.33712/mana.1254015

Öz

This study focuses on cybersecurity and artificial intelligence, which are considered essential tools for ensuring the necessary speed, agility, and flexibility in cybersecurity due to the increasing amount of data stored by governments in the cyber environment and the growing dependence on cyber infrastructure for public services. The aim of this study is to investigate why cybersecurity is a component of national security and the importance of artificial intelligence in cybersecurity, while also providing examples from country practices in the field of cybersecurity. The study, prepared through a literature review, revealed that the public sector (government) is the most affected by cyber-attacks, which can impact a country's military power and damage the trust between government and society. It also highlighted that cyber-attacks and increasing dependence on the cyber environment can sabotage the "trust" emotion that holds together government and community. Although the use of artificial intelligence in cyber-attacks is currently limited, it is expected to increase in the future, leading to an artificial intelligence-focused approach to cybersecurity. As a result, it is understood that cyber-attacks pose a potential threat to national security, making cybersecurity a crucial component. The study concludes by proposing measures to enhance cybersecurity based on country practices.

Kaynakça

  • ACCENTURE (2022a), “What is Cybersecurity?”, Accenture Corporate Web Page (E-Article), (tarihsiz), https://www.accenture.com/au-en/insights/cyber-security-index (Erişim Tarihi: 10.12.2022).
  • ACCENTURE (2022b), “Cybersecurity for Connected Energy Ecosystems”, Accenture Corporate Web Page (E-Article), (tarihsiz), https://www.accenture.com/be-en/insights/utilities/cybersecurity-connected-energy (Erişim Tarihi: 10.12.2022).
  • AK, Tarık (2021), “Yapay Zekâ Teknolojileri, Güvenlik ve Kolluk Kuvvetlerinin Suç Önleme Faaliyetleri”, SDE Akademi Dergisi, S.1(1), ss.120-140.
  • ALPEROVITCH, Dimitri (2022), “How Russia Has Turned Ukraine into a Cyber-Battlefield the Kremlin’s Hackers Are Already Targeting Kyiv”, Foreign Affairs (E-Article), 28 Ocak 2022, https://www.foreignaffairs.com/articles/russia-fsu/2022-01-28/how-russia-has-turned-ukraine-cyber-battlefield (Erişim Tarihi: 28.12.2022).
  • ARDIELLI, Eva ve ARDIELLI, Jiří (2017), “Cyber Security in Public Administration of Czech Republic”, Socıálno-Ekonomıcká Revue, S.15(4), ss.42-50.
  • BANSEMER, John (2021), “Soon, the Hackers Won’t be Human But AI Can Boost Cyber Defenses, too”, Foreign Affairs (E-Article), 10 Aralık 2022, https://www.foreignaffairs.com/articles/united-states/2021-12-10/soon-hackers-wont-be-human (Erişim Tarihi: 28.12.2022).
  • BOOKER, Lashon B. ve MUSMAN, Scott A. (2020), “A Model-Based, Decision-Theoretic Perspective on Automated Cyber Response”, The AAAI-20 Workshop on Artificial Intelligence for Cyber Security (AICS), 7-8 Şubat 2020 – New York (US), ss.1-10.
  • CAN, Aybike (2022), “Ulusal Güvenlik Açısından Kritik Altyapı ve Siber Alan: Sivil Hazırlıklılık ve Dirençlilik Perspektifinden Kavramsal Bir İnceleme”, Diplomasi ve Strateji Dergisi, S.3(2), ss.279-311.
  • CHAKRABORTY, Anirban (2020), “Technology to Combat Cyber Attacks by Artificial Intelligence”, International Journal of Progressive Research in Science and Engineering, S.1(3), ss.149-153.
  • CHANG, Kenneth (2014), “Automating Cybersecurity”, The New York Times, 03 Haziran 2014, https://www.nytimes.com/2014/06/03/science/automating-cybersecurity.html?searchResultPosition=1 (Erişim Tarihi: 04.12.2014).
  • CISA (2021), “Cybersecurıty Awareness Month 2021: Do Your Part”, CISA Corporate Web Page (E-Article), https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20One%20Pager.pdf (Erişim Tarihi: 15.11.2021).
  • COFFEY, Luke (2019), “How to Defeat Hybrid Warfare Before it Starts”, Defence One, 21 Ocak 2019, https://www.defenseone.com/ideas/2019/01/how-defeat-hybrid-warfare-it-starts/154296/ (Erişim Tarihi: 10.12.2019).
  • DARICILI, A. Burak ve ÇELİK, Soner (2022), “National Security 2.0: The Cyber Security of Critical Infrastructure”, PERCEPTIONS: Journal of International Affairs, S.26(2), ss.259-276.
  • DVORSKY, George (2017), “Hackers Have Already Started to Weaponize Artificial Intelligence”, Gizmoda Corporate Web Page, 17 Eylül 2017, https://gizmodo.com/hackers-have-already-started-to-weaponize-artificial-in-1797688425 (Erişim Tarihi: 14.12.2022).
  • EFE, Ahmet (2021), “Yapay Zekâ Odaklı Siber Risk ve Güvenlik Yönetimi”, Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar Bilimleri Dergisi, S.5(2), ss.144-165.
  • EGGERS, William D. (2016), “Government’s Cyber Challenge”, Deloitte Review, S.16, ss.138-155. ERDOĞAN, Uğur (2021), “Dijital Dönüşüm Çağında Dijital Girişimcilik ve Dijital İnovasyon”, Girişimcilik ve İnovasyon Araştırmaları: Yeni Trendler ve Dijital Dönüşüm (Ed. Zekeriya MIZIRAK, Ali KAHRAMAN, Birol MERCAN, Fatih KALECİ), Necmettin Erbakan Üniversitesi Yayınları, Konya, ss.1-26.
  • ERDOĞAN, Uğur (2022), “Lojistikte Dijital Dönüşüm: Akıllı Lojistik”, Dijital Dünyanın Kapılarını Aralamak Farklı Bakış Açılarından Dijitalleşme Üzerine Güncel Yazılar (Ed. Özlem AKGÜN, Meltem DİKTAŞ), Nobel Akademik Yayınları, Ankara, ss.577-603.
  • EUROPEAN PARLIAMENT (2023), “Cybersecurity: Main and Emerging Threats”, News European Parliament,https://www.europarl.europa.eu/news/en/headlines/society/20220120STO21428/cybersecurity-main-and-emerging-threats (Erişim Tarihi: 02.02.2023).
  • FADIA, Ankit, NAYFEH, Mahir ve NOBLE, John (2020), “Follow the Leaders: How Governments Can Combat Intensifying Cybersecurity Risks”, McKinsey & Company (E-Article), 16 Eylül 2020, https://www.mckinsey.com/industries/public-and-social-sector/our-insights/follow-the-leaders-how-governments-can-combat-intensifying-cybersecurity-risks (Erişim Tarihi: 15.12.2022).
  • FILKENSTEIN, Claire Oakes ve GOVERN, Kevin H. (2015), “Introduction: Cyber and the Changing Face of War”, Faculty Scholarship at Penn Law, https://scholarship.law.upenn.edu/faculty_scholarship/1566 (Erişim Tarihi: 30.11.2022).
  • FLOURNOY, Michele ve SULMEYER, Michael (2018), “Battlefield Internet a Plan for Securing Cyberspace”, Foreign Affairs, 14 Ağustos 2018, https://www.foreignaffairs.com/articles/world/2018-08-14/battlefield-internet adresinden alındı (Erişim Tarihi: 25.11.2022).
  • GEZİCİ, Hikmet Salahaddin (2022), “Yapay Zekâ”, Kurumsal Bilgi Yönetimi Teknolojik Eğilimler (Ed. Mustafa KOCAOĞLU, Sefa USTA), Eğitim Yayınevi, Konya, ss.79-99.
  • GEZİCİ, Hikmet Salahaddin (2022), “Yapay Zekâ ve Vergi Yönetimi: Finlandiya Örneği”, Vergi Raporu, S.277, ss.46-66.
  • HAJOARY, Pinosh Kumar ve AKHILESH, K. B. (2020), “Role of Government in Tackling Cyber Security Threat”, Smart Technologies: Scope and Applications (Eds. K. B. Akhilesh, D. P. Möller), Springer Publisher, Singapore, ss.79-96.
  • HENNESSEY, Susan (2017), “Deterring Cyberattacks How to Reduce Vulnerability”, Foreign Affairs, https://www.foreignaffairs.com/reviews/review-essay/2017-10-16/deterring-cyberattacks (Erişim Tarihi: 25.11.2022).
  • ILVES, Toomas H. (2013), “Cybersecurity: A View from the Front”, The New York Times, 11 Nisan 2013, https://www.nytimes.com/2013/04/12/opinion/global/cybersecurity-a-view-from-the-front.html?searchResultPosition=16 (Erişim Tarihi: 15.12.2022).
  • IŞIK, Öykü, JELASSI, Tawfik ve KELLER-BIRRER, Valerie (2022), “Five Lessons of Cybersecurity the Public Sector Can Offer”, The European Business Review, 4 Mayıs 2022, https://www.europeanbusinessreview.com/five-lessons-of-cybersecurity-the-public-sector-can-offer/ (Erişim Tarihi: 05.12.2022).
  • KARASOY, Hasan Alpay (2021), Kamu Güvenliğinde Yeni Paradigmalar: Hibrit Savaş, Asimetrik Savaş, Vekalet Savaşı, İstihbarat ve Terörle Mücadele, Nobel Yayınları, Ankara.
  • KARASOY, Hasan Alpay (2022), “Hibrit, Asimetrik ve Vekâlet Savaşları: 2022 Rusya Ukrayna Savaşını Üçlü Sacayağı Üzerinde Bir İnceleme”, Medeniyet Araştırmaları Derrgisi, S.7(2), ss.44-56.
  • KOCH, Tobias, MOLLER, Dietmar P. ve DEUTSCHMANN, Andreas (2020), “Smart Technologies as a Thread for Critical Infrastructures”, Smart Technologies: Scope and Applications (Eds. K. B. Akhilesh, D. P. Möller), Springer Publisher, Singapore, ss.275-289.
  • KÖKER, Ahmet Emre (2022), “Ulusal Siber Güvenlik Stratejisi: Fransa”, UPA Strategic Affairs, S.3(1), ss.42-78.
  • KÜÇÜKŞAHİN, Ahmet (2006), “Güvenlik Bağlamında Risk ve Tehdit Kavramları Arasındaki Farklar Nelerdir ve Nasıl Belirlenmelidir?”, Güvenlik Stratejileri Dergisi, S.2(4), ss.7-41.
  • KÜPELİ, Hayrettin (2019), “Kritik Altyapılar ve Terörizm Tehdidi”, Genel Olarak İç Güvenlik Yönetimi (Ed. T. Avaner, B. Övgün), Gazi Kitabevi Yayını, Ankara, ss.85-110.
  • LEE, Martin ve TALOS, Cisco (2022), “Russia’s War in Ukraine: 3 Cybersecurity Takeaways for Enterprises”, Venturebeat (E-Article), 13 Kasım 2022, https://venturebeat.com/security/russias-war-in-ukraine-3-cybersecurity-takeaways-for-enterprises/ (Erişim Tarihi: 05.12.2022).
  • LEENEN, Louise ve MEYER, Thomas (2019), “Artificial Intelligence and Big Data Analytics in Support of Cyber Defense”, Developments in Information Security and Cybernetic Wars (Ed. M. Sarfaz), IGI Global Publisher, Pennsylvania (US), ss.42-63.
  • LONGLEY, Robert (2021), “National Security Definition and Examples”, Thoughtco (E-Article), 24 Eylül 2021, https://www.thoughtco.com/national-security-definition-and-examples-5197450 (Erişim Tarihi: 25.11.2021).
  • LYNN, William J. (2010), “Defending a New Domain the Pentagon’s Cyberstrategy”, Foreign Affairs, 1 Eylül 2010, https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain (Erişim Tarihi: 02.12.2022).
  • LYNN, William J. (2011), “The Pentagon’s Cyberstrategy, One Year Later”, Foreign Affairs, 28 Eylül 2011, https://www.foreignaffairs.com/united-states/pentagons-cyberstrategy-one-year-later (Erişim Tarihi: 10.12.2022).
  • NYE, Joseph S. (2021), “The End of Cyber-Anarchy? How to Build a New Digital Order”, Foreign Affairs, 14 Aralık 221, https://www.foreignaffairs.com/articles/russian-federation/2021-12-14/end-cyber-anarchy (Erişim Tarihi: 02.12.2022).
  • ÖZTAŞ, Nail (2014), Örgüt: Örgüt ve Yönetim Kuramları II, Otorite Yayınları, Ankara.
  • PATTERSON, Nicholas (2022), “What is Cyber Security and Why is it Important?”, Southern New Hampshire University, 21 Temmuz 2022, https://www.snhu.edu/about-us/newsroom/stem/what-is-cyber-security (Erişim Tarihi: 04.12.2022).
  • PEARSON, James (2022), “Russia Downed Satellite Internet in Ukraine -Western Officials”, Reuters, 10 Mayıs 2022, https://www.reuters.com/world/europe/russia-behind-cyberattack-against-satellite-internet-modems-ukraine-eu-2022-05-10/ (Erişim Tarihi: 30.11.2022).
  • PEARSON, James ve BING, Christopher (2022), “The Cyber War between Ukraine and Russia: An Overview”, Reuters, 10 Mayıs 2022, https://www.reuters.com/world/europe/factbox-the-cyber-war-between-ukraine-russia-2022-05-10/ (Erişim Tarihi: 30.11.2022).
  • RAINER, R. Kelly, PRINCE, Brad, SPLETTSTOESSER-HOGETERP, Ingrid, SANCHEZ-RODRİGUEZ CRİSTOBAL, Ebrahimi Sepideh (2020), Introduction to Information Systems Supporting and Transforming Business, Wiley Publisher, Canadian, Fifth Canadian Edition.
  • REUTERS (2022), “Montenegro's State Infrastructure Hit By Cyber Attack – Officials”, Reuters, 26 Ağustos 2022, https://www.reuters.com/world/europe/montenegros-state-infrastructure-hit-by-cyber-attack-officials-2022-08-26/ (Erişim Tarihi: 30.11.2022).
  • SCHARRE, Paul (2019), “Killer Apps the Real Dangers of an AI Arms Race”, Foreign Affairs, 16 Nisan 2019, https://www.foreignaffairs.com/articles/2019-04-16/killer-apps (Erişim Tarihi: 04.12.2022).
  • SCHNEIDER, Jacquelyn (2021), “A World Without Trust the Insidious Cyberthreat”, Foreign Affairs, 14 Aralık 2021, https://www.foreignaffairs.com/articles/world/2021-12-14/world-without-trust (Erişim Tarihi: 30.11.2022).
  • SHABBIR, Jahanzaib ve ANWER, Tarique (2015), “Artificial Intelligence and its Role in Near Future”, Journal of Latex Class Files, S.14(8), ss.1-11.
  • SIEBOLD, Sabine (2022), “Cyber as Important as Missile Defences - ex-NATO General”, Reuters, 21 Aralık 2022, https://www.reuters.com/world/cyber-important-missile-defences-ex-nato-general-2022-11-21/ (Erişim Tarihi: 10.12.2022).
  • SINGAR, Arjun V. ve AKHILESH, K. B. (2020), “Role of Cyber-Security in Higher Education”, Smart Technologies: Scope and Applications (Eds. K. B. Akhilesh, D. P. Möller), Springer Publisher, Singapore, ss.249-264.
  • ŞEN, Y. Furkan ve YURTOĞLU, Doğanay (2020), “Teknoloji ve Güvenlik İlişkisi Bağlamında Yapay Zekânın İstihbarat Analizindeki Önemi”, Güvenlik Çalışmaları Dergisi, S.22(1), ss.24-48.
  • TRUONG, Thanh Cong, DIEP, Quoc Bao ve ZELINKA, Ivan (2020), “Artificial Intelligence in the Cyber Domain: Offense and Defense”, Symmetry, S.12(3), ss.1-24.
  • ÜNVER, Gül Nazik (2017), “Ulusal Siber Güvenlik Strateji Belgelerinde İnsan Hakları”, Cyberpolitik Journal, S.2(4), ss.104-129.
  • VIOLINO, Bob (2022), “Artificial Intelligence is Playing a Bigger Role in Cybersecurity, But the Bad Guys May Benefit the Most”, CNBC, 18 Eylül 2022, https://www.cnbc.com/2022/09/13/ai-has-bigger-role-in-cybersecurity-but-hackers-may-benefit-the-most.html (Erişim Tarihi: 05.12.2022).

Bombalardan Baytlara: Siber Güvenliğin Ulusal Güvenlikteki Rolü ve Yapay Zekânın Siber Güvenlikteki Önemi

Yıl 2023, Cilt: 6 Sayı: 1, 173 - 188, 31.03.2023
https://doi.org/10.33712/mana.1254015

Öz

Bu çalışma, devletin siber ortamda depoladığı veri miktarının artması ve kamu hizmetlerinin giderek daha fazla siber ortam aracılığıyla sunulması nedeniyle siber güvenliğe; siber güvenliğin sağlanmasında ise gerekli hız, çeviklik ve esnekliği sağlayan bir araç olarak görülen yapan zekâya odaklanmaktadır. Çalışmanın amacı ise siber güvenliğin neden bir ulusal güvenlik bileşeni olduğunun ve yapay zekânın siber güvenlikteki öneminin araştırılması, siber güvenlik alanında ülke uygulamalarından örnekler sunarak bunlardan çıkarımlar yapılmasıdır. Literatür taraması yapılarak hazırlanan bu çalışma sonucunda kamu sektörünün (devletin) siber saldırılardan en çok etkilenen alan olduğu; siber saldırıların askeri gücün operasyon sahasına yansıtılmasını etkileyebileceği; siber saldırıların ve siber ortama artan bağımlılığın toplum ve devleti bir arada tutan “güven” duygusunu baltalayabileceği; günümüzde siber saldırılarda yapay zekâ kullanımının kısıtlı olduğu ancak gelecekte kullanımının artacağı öngörüsü nedeniyle geleceğin siber güvenliğinin yapay zekâ odaklı hale geleceği gibi hususların önem taşıdığı görülmüştür. Buradan hareketle siber saldırıların ulusal güvenliği tehdit edebilecek potansiyelinin bulunduğu ve siber güvenliğin bir ulusal güvenlik bileşeni olduğu anlaşılmaktadır. Çalışmanın sonuç bölümünde de ülkelerin siber güvenlik uygulamalarından hareketle siber güvenliğin sağlanmasına yönelik önerilere yer verilmiştir.

Kaynakça

  • ACCENTURE (2022a), “What is Cybersecurity?”, Accenture Corporate Web Page (E-Article), (tarihsiz), https://www.accenture.com/au-en/insights/cyber-security-index (Erişim Tarihi: 10.12.2022).
  • ACCENTURE (2022b), “Cybersecurity for Connected Energy Ecosystems”, Accenture Corporate Web Page (E-Article), (tarihsiz), https://www.accenture.com/be-en/insights/utilities/cybersecurity-connected-energy (Erişim Tarihi: 10.12.2022).
  • AK, Tarık (2021), “Yapay Zekâ Teknolojileri, Güvenlik ve Kolluk Kuvvetlerinin Suç Önleme Faaliyetleri”, SDE Akademi Dergisi, S.1(1), ss.120-140.
  • ALPEROVITCH, Dimitri (2022), “How Russia Has Turned Ukraine into a Cyber-Battlefield the Kremlin’s Hackers Are Already Targeting Kyiv”, Foreign Affairs (E-Article), 28 Ocak 2022, https://www.foreignaffairs.com/articles/russia-fsu/2022-01-28/how-russia-has-turned-ukraine-cyber-battlefield (Erişim Tarihi: 28.12.2022).
  • ARDIELLI, Eva ve ARDIELLI, Jiří (2017), “Cyber Security in Public Administration of Czech Republic”, Socıálno-Ekonomıcká Revue, S.15(4), ss.42-50.
  • BANSEMER, John (2021), “Soon, the Hackers Won’t be Human But AI Can Boost Cyber Defenses, too”, Foreign Affairs (E-Article), 10 Aralık 2022, https://www.foreignaffairs.com/articles/united-states/2021-12-10/soon-hackers-wont-be-human (Erişim Tarihi: 28.12.2022).
  • BOOKER, Lashon B. ve MUSMAN, Scott A. (2020), “A Model-Based, Decision-Theoretic Perspective on Automated Cyber Response”, The AAAI-20 Workshop on Artificial Intelligence for Cyber Security (AICS), 7-8 Şubat 2020 – New York (US), ss.1-10.
  • CAN, Aybike (2022), “Ulusal Güvenlik Açısından Kritik Altyapı ve Siber Alan: Sivil Hazırlıklılık ve Dirençlilik Perspektifinden Kavramsal Bir İnceleme”, Diplomasi ve Strateji Dergisi, S.3(2), ss.279-311.
  • CHAKRABORTY, Anirban (2020), “Technology to Combat Cyber Attacks by Artificial Intelligence”, International Journal of Progressive Research in Science and Engineering, S.1(3), ss.149-153.
  • CHANG, Kenneth (2014), “Automating Cybersecurity”, The New York Times, 03 Haziran 2014, https://www.nytimes.com/2014/06/03/science/automating-cybersecurity.html?searchResultPosition=1 (Erişim Tarihi: 04.12.2014).
  • CISA (2021), “Cybersecurıty Awareness Month 2021: Do Your Part”, CISA Corporate Web Page (E-Article), https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Awareness%20Month%202021%20-%20One%20Pager.pdf (Erişim Tarihi: 15.11.2021).
  • COFFEY, Luke (2019), “How to Defeat Hybrid Warfare Before it Starts”, Defence One, 21 Ocak 2019, https://www.defenseone.com/ideas/2019/01/how-defeat-hybrid-warfare-it-starts/154296/ (Erişim Tarihi: 10.12.2019).
  • DARICILI, A. Burak ve ÇELİK, Soner (2022), “National Security 2.0: The Cyber Security of Critical Infrastructure”, PERCEPTIONS: Journal of International Affairs, S.26(2), ss.259-276.
  • DVORSKY, George (2017), “Hackers Have Already Started to Weaponize Artificial Intelligence”, Gizmoda Corporate Web Page, 17 Eylül 2017, https://gizmodo.com/hackers-have-already-started-to-weaponize-artificial-in-1797688425 (Erişim Tarihi: 14.12.2022).
  • EFE, Ahmet (2021), “Yapay Zekâ Odaklı Siber Risk ve Güvenlik Yönetimi”, Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar Bilimleri Dergisi, S.5(2), ss.144-165.
  • EGGERS, William D. (2016), “Government’s Cyber Challenge”, Deloitte Review, S.16, ss.138-155. ERDOĞAN, Uğur (2021), “Dijital Dönüşüm Çağında Dijital Girişimcilik ve Dijital İnovasyon”, Girişimcilik ve İnovasyon Araştırmaları: Yeni Trendler ve Dijital Dönüşüm (Ed. Zekeriya MIZIRAK, Ali KAHRAMAN, Birol MERCAN, Fatih KALECİ), Necmettin Erbakan Üniversitesi Yayınları, Konya, ss.1-26.
  • ERDOĞAN, Uğur (2022), “Lojistikte Dijital Dönüşüm: Akıllı Lojistik”, Dijital Dünyanın Kapılarını Aralamak Farklı Bakış Açılarından Dijitalleşme Üzerine Güncel Yazılar (Ed. Özlem AKGÜN, Meltem DİKTAŞ), Nobel Akademik Yayınları, Ankara, ss.577-603.
  • EUROPEAN PARLIAMENT (2023), “Cybersecurity: Main and Emerging Threats”, News European Parliament,https://www.europarl.europa.eu/news/en/headlines/society/20220120STO21428/cybersecurity-main-and-emerging-threats (Erişim Tarihi: 02.02.2023).
  • FADIA, Ankit, NAYFEH, Mahir ve NOBLE, John (2020), “Follow the Leaders: How Governments Can Combat Intensifying Cybersecurity Risks”, McKinsey & Company (E-Article), 16 Eylül 2020, https://www.mckinsey.com/industries/public-and-social-sector/our-insights/follow-the-leaders-how-governments-can-combat-intensifying-cybersecurity-risks (Erişim Tarihi: 15.12.2022).
  • FILKENSTEIN, Claire Oakes ve GOVERN, Kevin H. (2015), “Introduction: Cyber and the Changing Face of War”, Faculty Scholarship at Penn Law, https://scholarship.law.upenn.edu/faculty_scholarship/1566 (Erişim Tarihi: 30.11.2022).
  • FLOURNOY, Michele ve SULMEYER, Michael (2018), “Battlefield Internet a Plan for Securing Cyberspace”, Foreign Affairs, 14 Ağustos 2018, https://www.foreignaffairs.com/articles/world/2018-08-14/battlefield-internet adresinden alındı (Erişim Tarihi: 25.11.2022).
  • GEZİCİ, Hikmet Salahaddin (2022), “Yapay Zekâ”, Kurumsal Bilgi Yönetimi Teknolojik Eğilimler (Ed. Mustafa KOCAOĞLU, Sefa USTA), Eğitim Yayınevi, Konya, ss.79-99.
  • GEZİCİ, Hikmet Salahaddin (2022), “Yapay Zekâ ve Vergi Yönetimi: Finlandiya Örneği”, Vergi Raporu, S.277, ss.46-66.
  • HAJOARY, Pinosh Kumar ve AKHILESH, K. B. (2020), “Role of Government in Tackling Cyber Security Threat”, Smart Technologies: Scope and Applications (Eds. K. B. Akhilesh, D. P. Möller), Springer Publisher, Singapore, ss.79-96.
  • HENNESSEY, Susan (2017), “Deterring Cyberattacks How to Reduce Vulnerability”, Foreign Affairs, https://www.foreignaffairs.com/reviews/review-essay/2017-10-16/deterring-cyberattacks (Erişim Tarihi: 25.11.2022).
  • ILVES, Toomas H. (2013), “Cybersecurity: A View from the Front”, The New York Times, 11 Nisan 2013, https://www.nytimes.com/2013/04/12/opinion/global/cybersecurity-a-view-from-the-front.html?searchResultPosition=16 (Erişim Tarihi: 15.12.2022).
  • IŞIK, Öykü, JELASSI, Tawfik ve KELLER-BIRRER, Valerie (2022), “Five Lessons of Cybersecurity the Public Sector Can Offer”, The European Business Review, 4 Mayıs 2022, https://www.europeanbusinessreview.com/five-lessons-of-cybersecurity-the-public-sector-can-offer/ (Erişim Tarihi: 05.12.2022).
  • KARASOY, Hasan Alpay (2021), Kamu Güvenliğinde Yeni Paradigmalar: Hibrit Savaş, Asimetrik Savaş, Vekalet Savaşı, İstihbarat ve Terörle Mücadele, Nobel Yayınları, Ankara.
  • KARASOY, Hasan Alpay (2022), “Hibrit, Asimetrik ve Vekâlet Savaşları: 2022 Rusya Ukrayna Savaşını Üçlü Sacayağı Üzerinde Bir İnceleme”, Medeniyet Araştırmaları Derrgisi, S.7(2), ss.44-56.
  • KOCH, Tobias, MOLLER, Dietmar P. ve DEUTSCHMANN, Andreas (2020), “Smart Technologies as a Thread for Critical Infrastructures”, Smart Technologies: Scope and Applications (Eds. K. B. Akhilesh, D. P. Möller), Springer Publisher, Singapore, ss.275-289.
  • KÖKER, Ahmet Emre (2022), “Ulusal Siber Güvenlik Stratejisi: Fransa”, UPA Strategic Affairs, S.3(1), ss.42-78.
  • KÜÇÜKŞAHİN, Ahmet (2006), “Güvenlik Bağlamında Risk ve Tehdit Kavramları Arasındaki Farklar Nelerdir ve Nasıl Belirlenmelidir?”, Güvenlik Stratejileri Dergisi, S.2(4), ss.7-41.
  • KÜPELİ, Hayrettin (2019), “Kritik Altyapılar ve Terörizm Tehdidi”, Genel Olarak İç Güvenlik Yönetimi (Ed. T. Avaner, B. Övgün), Gazi Kitabevi Yayını, Ankara, ss.85-110.
  • LEE, Martin ve TALOS, Cisco (2022), “Russia’s War in Ukraine: 3 Cybersecurity Takeaways for Enterprises”, Venturebeat (E-Article), 13 Kasım 2022, https://venturebeat.com/security/russias-war-in-ukraine-3-cybersecurity-takeaways-for-enterprises/ (Erişim Tarihi: 05.12.2022).
  • LEENEN, Louise ve MEYER, Thomas (2019), “Artificial Intelligence and Big Data Analytics in Support of Cyber Defense”, Developments in Information Security and Cybernetic Wars (Ed. M. Sarfaz), IGI Global Publisher, Pennsylvania (US), ss.42-63.
  • LONGLEY, Robert (2021), “National Security Definition and Examples”, Thoughtco (E-Article), 24 Eylül 2021, https://www.thoughtco.com/national-security-definition-and-examples-5197450 (Erişim Tarihi: 25.11.2021).
  • LYNN, William J. (2010), “Defending a New Domain the Pentagon’s Cyberstrategy”, Foreign Affairs, 1 Eylül 2010, https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain (Erişim Tarihi: 02.12.2022).
  • LYNN, William J. (2011), “The Pentagon’s Cyberstrategy, One Year Later”, Foreign Affairs, 28 Eylül 2011, https://www.foreignaffairs.com/united-states/pentagons-cyberstrategy-one-year-later (Erişim Tarihi: 10.12.2022).
  • NYE, Joseph S. (2021), “The End of Cyber-Anarchy? How to Build a New Digital Order”, Foreign Affairs, 14 Aralık 221, https://www.foreignaffairs.com/articles/russian-federation/2021-12-14/end-cyber-anarchy (Erişim Tarihi: 02.12.2022).
  • ÖZTAŞ, Nail (2014), Örgüt: Örgüt ve Yönetim Kuramları II, Otorite Yayınları, Ankara.
  • PATTERSON, Nicholas (2022), “What is Cyber Security and Why is it Important?”, Southern New Hampshire University, 21 Temmuz 2022, https://www.snhu.edu/about-us/newsroom/stem/what-is-cyber-security (Erişim Tarihi: 04.12.2022).
  • PEARSON, James (2022), “Russia Downed Satellite Internet in Ukraine -Western Officials”, Reuters, 10 Mayıs 2022, https://www.reuters.com/world/europe/russia-behind-cyberattack-against-satellite-internet-modems-ukraine-eu-2022-05-10/ (Erişim Tarihi: 30.11.2022).
  • PEARSON, James ve BING, Christopher (2022), “The Cyber War between Ukraine and Russia: An Overview”, Reuters, 10 Mayıs 2022, https://www.reuters.com/world/europe/factbox-the-cyber-war-between-ukraine-russia-2022-05-10/ (Erişim Tarihi: 30.11.2022).
  • RAINER, R. Kelly, PRINCE, Brad, SPLETTSTOESSER-HOGETERP, Ingrid, SANCHEZ-RODRİGUEZ CRİSTOBAL, Ebrahimi Sepideh (2020), Introduction to Information Systems Supporting and Transforming Business, Wiley Publisher, Canadian, Fifth Canadian Edition.
  • REUTERS (2022), “Montenegro's State Infrastructure Hit By Cyber Attack – Officials”, Reuters, 26 Ağustos 2022, https://www.reuters.com/world/europe/montenegros-state-infrastructure-hit-by-cyber-attack-officials-2022-08-26/ (Erişim Tarihi: 30.11.2022).
  • SCHARRE, Paul (2019), “Killer Apps the Real Dangers of an AI Arms Race”, Foreign Affairs, 16 Nisan 2019, https://www.foreignaffairs.com/articles/2019-04-16/killer-apps (Erişim Tarihi: 04.12.2022).
  • SCHNEIDER, Jacquelyn (2021), “A World Without Trust the Insidious Cyberthreat”, Foreign Affairs, 14 Aralık 2021, https://www.foreignaffairs.com/articles/world/2021-12-14/world-without-trust (Erişim Tarihi: 30.11.2022).
  • SHABBIR, Jahanzaib ve ANWER, Tarique (2015), “Artificial Intelligence and its Role in Near Future”, Journal of Latex Class Files, S.14(8), ss.1-11.
  • SIEBOLD, Sabine (2022), “Cyber as Important as Missile Defences - ex-NATO General”, Reuters, 21 Aralık 2022, https://www.reuters.com/world/cyber-important-missile-defences-ex-nato-general-2022-11-21/ (Erişim Tarihi: 10.12.2022).
  • SINGAR, Arjun V. ve AKHILESH, K. B. (2020), “Role of Cyber-Security in Higher Education”, Smart Technologies: Scope and Applications (Eds. K. B. Akhilesh, D. P. Möller), Springer Publisher, Singapore, ss.249-264.
  • ŞEN, Y. Furkan ve YURTOĞLU, Doğanay (2020), “Teknoloji ve Güvenlik İlişkisi Bağlamında Yapay Zekânın İstihbarat Analizindeki Önemi”, Güvenlik Çalışmaları Dergisi, S.22(1), ss.24-48.
  • TRUONG, Thanh Cong, DIEP, Quoc Bao ve ZELINKA, Ivan (2020), “Artificial Intelligence in the Cyber Domain: Offense and Defense”, Symmetry, S.12(3), ss.1-24.
  • ÜNVER, Gül Nazik (2017), “Ulusal Siber Güvenlik Strateji Belgelerinde İnsan Hakları”, Cyberpolitik Journal, S.2(4), ss.104-129.
  • VIOLINO, Bob (2022), “Artificial Intelligence is Playing a Bigger Role in Cybersecurity, But the Bad Guys May Benefit the Most”, CNBC, 18 Eylül 2022, https://www.cnbc.com/2022/09/13/ai-has-bigger-role-in-cybersecurity-but-hackers-may-benefit-the-most.html (Erişim Tarihi: 05.12.2022).
Toplam 54 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Kamu Yönetimi
Bölüm Makaleler
Yazarlar

H.alpay Karasoy 0000-0002-3813-2960

Hikmet Salahaddin Gezici 0000-0003-1573-2864

Yayımlanma Tarihi 31 Mart 2023
Yayımlandığı Sayı Yıl 2023 Cilt: 6 Sayı: 1

Kaynak Göster

APA Karasoy, H., & Gezici, H. S. (2023). Bombalardan Baytlara: Siber Güvenliğin Ulusal Güvenlikteki Rolü ve Yapay Zekânın Siber Güvenlikteki Önemi. Uluslararası Yönetim Akademisi Dergisi, 6(1), 173-188. https://doi.org/10.33712/mana.1254015