Araştırma Makalesi
BibTex RIS Kaynak Göster

SİBER SALDIRILAR: GELECEĞİN TERÖRÜ MÜ?

Yıl 2026, Cilt: 23 Sayı: 1, 243 - 268, 08.01.2026
https://doi.org/10.63117/yuhfd.1819058

Öz

Teknolojik gelişmeler günlük yaşantımızın her alanını kapsayarak büyük avantajlar sağlarken aynı zamanda siber saldırı tehditleri de giderek daha kritik bir endişe haline gelerek terörizmdeki potansiyel rolleri hakkında sorular ortaya çıkarmaktadır. Bu makale, siber saldırılar ve terörizmin kesişimini inceleyerek yeni bir terörizm biçimi olarak siber terörizmin potansiyellerine odaklanmaktadır. Her ne kadar geleneksel terörizm fiziksel şiddet ve zarar ile ilişkilendiriliyor olsa da kritik altyapıların teknolojiye daha da bağımlı hale gelmesiyle birlikte teröristlere fiziksel varlığa ihtiyaç duymadan ve az maliyetle ciddi etkilere sahip siber saldırılar gerçekleştirmesinin yeni yollarını sağlamaktadır. Ayrıca bu makale, kritik altyapı, finansal sistemler ve hükümet kuruluşlarını hedef alan son zamanlardaki yüksek profilli siber saldırıları inceleyerek, geleneksel terör eylemleri ile siber terörizm arasındaki amaç, niyet, etki ve nüfus üzerindeki psikolojik etkiler açısından benzerlikleri vurgulamaktadır. Dolayısıyla, siber terörizm yalnızca politik şiddet için bir araç değil, aynı zamanda ekonomik, sosyal ve psikolojik zarar verme yöntemi olup hükümetler ve küresel güvenlik için önemli zorluklar sunmaktadır. Makale, siber saldırıların bir terörizm biçimi olarak yasal ve etik etkilerini incelemekle birlikte gelecekte ortaya çıkacak eğilimleri, siber tehditlerde yapay zeka (AI) ve makine öğreniminin artan kullanımını da içerecek şekilde araştırmaktadır. Sonuç olarak, siber saldırıların gelecekte terörizmin temel unsurlarından biri haline gelmeye hazır olduğunu ve küresel güvenlik açısından çok önemli sonuçlar doğuracağını ileri sürmekte ve gelecekteki yörüngesine ilişkin önemli içgörüler sunmaktadır.

Kaynakça

  • Ahmad R and Yunos Z, ‘A Dynamic Cyber Terrorism Framework’ (2012) 30 International Journal of Computer Science and Information Security 149–158.
  • Ahmed Khan, Dipak, Kannan, Kiran, Kulkarni Madunix, Mohamed Iqbal, Nitai, Sagar and Shrikanth, Attack Types https://wentzwu.com/wp-content/uploads/2020/06/All-type-of-attack.pdf accessed 29 April 2025.
  • Cisco, ‘What Is the Difference: Viruses, Worms, Trojans, and Bots?’ http://www.cisco.com/c/en/us/about/security-center/virus-differences.html accessed 30 April 2025.
  • Conway M, ‘Cyberterrorism: Hype and Reality’ (Dublin City University) 6.
  • Conway M, ‘Reality Bytes: Cyberterrorism and Terrorist “Use” of the Internet’ (2002) 7 First Monday https://firstmonday.org/article/view/1001/922.
  • Denning D, ‘Cyberterrorism: Testimony’.
  • Denning D, ‘Terror’s Web: How the Internet is Transforming Terrorism’ in Y Jewkes and M Yar (eds), Handbook on Internet Crime (Willan Publishing 2010) 7.
  • Duygu Öztürk, “Türkiye’de Siber Terörizm ve Hukuki Boyut.” Türkiye Adalet Akademisi Dergisi, 2020/4, ss. 233–260.
  • Embar-Seddon A, ‘Cyberterrorism: Are We Under Siege?’ (2002) 45 The American Behavioral Scientist 1035.
  • Ergün M. Bir Siber Suç Olarak Siber Terörizm ve Türkiye. Yüksek Lisans Tezi, Atatürk Üniversitesi, Kriminalistik Ana Bilim Dalı, 2025.
  • EU Framework Decision 2002/475/JHA.
  • Gearty C, Terror (Faber & Faber 1998).
  • Gillespie A, Cybercrime: Key Issues and Debates (Routledge 2016).
  • Guelke A, The Age of Terrorism and the International Political System (IB Tauris 1998).
  • Heickerö R, ‘Cyberterrorism: Electronic Jihad’ (2014) 38 Strategic Analysis 555.
  • Hoffman B, Inside Terrorism (Indigo 1998).
  • Hua J and Bapna S, ‘The Economic Impact of Cyber Terrorism’ (2013) 22 The Journal of Strategic Information Systems 175–186 https://doi.org/10.1016/j.jsis.2012.10.004.
  • Hua J and Bapna S, ‘How Can We Deter Cyber Terrorism?’ (2012) 21 Information Security Journal: A Global Perspective 104.
  • International Conference on Natural Sciences and Technologies, Terrorist Use of Cyber Technology (Iconat Special Issue 2021) 9: 113–128 https://doi.org/10.20290/estubtdb.1021324.
  • Iftikhar S, ‘Cyberterrorism as a Global Threat: A Review on Repercussions and Countermeasures’ (2024) 10 PeerJ Comput. Sci. e1772 http://doi.org/10.7717/peerj-cs.1772 accessed 23 June 2025.
  • Jones A, ‘Cyber Terrorism: Fact or Fiction’ (2005) 6 Computer Fraud and Security 4–7.
  • Merlos García A, ‘Internet como instrumento para la yihad’ (2006) 8 Araucaria 80–99.
  • Metin Gürcan & M. Erdoğan, “Siber Terörizm ve Kritik Altyapılar.” Güvenlik Bilimleri Dergisi, Cilt 7, Sayı 2 (2018): ss. 65–90.
  • OGUN MN and Kaya A, ‘Siber Güvenliğin Milli Güvenlik Açısından Önemi ve Alınabilecek Tedbirler’ (2013) 9(18) Güvenlik Stratejileri Dergisi 145–181.
  • OGUN MN, YURTSEVER S, ASLAN M and ELBURASI M, ‘Terrorist Use of Cyber Technology’ (2021) 9 International Conference on Natural Sciences and Technologies, 113–128 https://doi.org/10.20290/estubtdb.1021324.
  • Oğün, S. & Kaya, Ö., “Siber Güvenliğin Milli Güvenlik Açısından Önemi.” Uluslararası Güvenlik ve Terörizm Dergisi, Cilt 4, Sayı 1 (2013): ss. 27–45.
  • Özdemir B. “Türkiye’nin Siber Güvenlik Stratejileri.” Journal of National Defense 12, no. 3 (2020): 100–115.
  • Pollitt M, ‘Cyberterrorism: Fact or Fancy?’ 9.
  • Post JM, Ruby KG and Shaw ED, ‘From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism’ (2000) 12 Terrorism and Political Violence 101.
  • Proofpoint, ‘What Is a Cyber-Attack?’ https://www.proofpoint.com/au/threat-reference/cyber-attack accessed 28 April 2025.
  • Sánchez Medero G, ‘Ciberespacio y el crimen organizado. Los nuevos desafíos del siglo XXI’ (2012) 10(16) Facultad de Ciencias Políticas y Sociología Universidad Complutense de Madrid 71–87.
  • Seissa IG, ‘Cyber-terrorism Definition Patterns and Mitigation Strategies: A Literature Review’ (2017) 6(1) International Journal of Science and Research (IJSR) 180–186.
  • Terrorism C o. (ed), Responses to Cyber Terrorism (1st edn, vol 34, IOS Press 2008).
  • UN Security Council Resolutions 1373, 1566.
  • Yurtsever B. Küreselleşen Dünyada Terörizm: Siber Terörizm Örneği. Yüksek Lisans Tezi, Niğde Ömer Halisdemir Üniversitesi, Kasım 2020, s. 82.
  • Wardlaw G, Political Terrorism: Theory, Tactics, and Countermeasures (Cambridge University Press 1982).
  • Weimann G, ‘Cyberterrorism: The Sum of All Fears’ (2005) 28(2) Studies in Conflict and Terrorism 129–149 https://doi.org/10.1080/10576100590905110.
  • Weimann G, ‘How Modern Terrorism Uses the Internet’ (2004) http://ics.leeds.ac.uk/papers/vp01.cfm?outfit=pmt&requesttimeout=500&folder=1259&paper=1542.
  • Whiting A, Macdonald S and Jarvis L, Cyberterrorism: Understandings, Debates and Representations.

CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?

Yıl 2026, Cilt: 23 Sayı: 1, 243 - 268, 08.01.2026
https://doi.org/10.63117/yuhfd.1819058

Öz

While technological advances have encompassed every aspect of our daily lives and provided great advantages, cyberattacks have also become an increasingly critical concern, raising questions about their potential role in terrorism. This article examines the intersection of cyberattacks and terrorism, focusing on the potential of cyberterrorism as a new form of terrorism. While traditional terrorism has been associated with physical violence and harm, the increasing reliance on technology in critical infrastructures has provided terrorists with new ways to carry out serious cyberattacks without the need for physical presence and at low cost. In addition, this article examines recent high-profile cyberattacks targeting critical infrastructure, financial systems, and government organizations, highlighting the similarities between traditional terrorist acts and cyberterrorism in terms of purpose, intent, impact, and psychological impact on the population. Thus, cyberterrorism is not only a tool for political violence, but also a method of inflicting economic, social, and psychological harm, presenting significant challenges to governments and global security. The article examines the legal and ethical implications of cyberattacks as a form of terrorism, as well as exploring future trends that include the increasing use of artificial intelligence (AI) and machine learning in cyber threats. It concludes by arguing that cyberattacks are set to become a key element of terrorism in the future, with significant implications for global security, and offers important insights into their future trajectory.

Kaynakça

  • Ahmad R and Yunos Z, ‘A Dynamic Cyber Terrorism Framework’ (2012) 30 International Journal of Computer Science and Information Security 149–158.
  • Ahmed Khan, Dipak, Kannan, Kiran, Kulkarni Madunix, Mohamed Iqbal, Nitai, Sagar and Shrikanth, Attack Types https://wentzwu.com/wp-content/uploads/2020/06/All-type-of-attack.pdf accessed 29 April 2025.
  • Cisco, ‘What Is the Difference: Viruses, Worms, Trojans, and Bots?’ http://www.cisco.com/c/en/us/about/security-center/virus-differences.html accessed 30 April 2025.
  • Conway M, ‘Cyberterrorism: Hype and Reality’ (Dublin City University) 6.
  • Conway M, ‘Reality Bytes: Cyberterrorism and Terrorist “Use” of the Internet’ (2002) 7 First Monday https://firstmonday.org/article/view/1001/922.
  • Denning D, ‘Cyberterrorism: Testimony’.
  • Denning D, ‘Terror’s Web: How the Internet is Transforming Terrorism’ in Y Jewkes and M Yar (eds), Handbook on Internet Crime (Willan Publishing 2010) 7.
  • Duygu Öztürk, “Türkiye’de Siber Terörizm ve Hukuki Boyut.” Türkiye Adalet Akademisi Dergisi, 2020/4, ss. 233–260.
  • Embar-Seddon A, ‘Cyberterrorism: Are We Under Siege?’ (2002) 45 The American Behavioral Scientist 1035.
  • Ergün M. Bir Siber Suç Olarak Siber Terörizm ve Türkiye. Yüksek Lisans Tezi, Atatürk Üniversitesi, Kriminalistik Ana Bilim Dalı, 2025.
  • EU Framework Decision 2002/475/JHA.
  • Gearty C, Terror (Faber & Faber 1998).
  • Gillespie A, Cybercrime: Key Issues and Debates (Routledge 2016).
  • Guelke A, The Age of Terrorism and the International Political System (IB Tauris 1998).
  • Heickerö R, ‘Cyberterrorism: Electronic Jihad’ (2014) 38 Strategic Analysis 555.
  • Hoffman B, Inside Terrorism (Indigo 1998).
  • Hua J and Bapna S, ‘The Economic Impact of Cyber Terrorism’ (2013) 22 The Journal of Strategic Information Systems 175–186 https://doi.org/10.1016/j.jsis.2012.10.004.
  • Hua J and Bapna S, ‘How Can We Deter Cyber Terrorism?’ (2012) 21 Information Security Journal: A Global Perspective 104.
  • International Conference on Natural Sciences and Technologies, Terrorist Use of Cyber Technology (Iconat Special Issue 2021) 9: 113–128 https://doi.org/10.20290/estubtdb.1021324.
  • Iftikhar S, ‘Cyberterrorism as a Global Threat: A Review on Repercussions and Countermeasures’ (2024) 10 PeerJ Comput. Sci. e1772 http://doi.org/10.7717/peerj-cs.1772 accessed 23 June 2025.
  • Jones A, ‘Cyber Terrorism: Fact or Fiction’ (2005) 6 Computer Fraud and Security 4–7.
  • Merlos García A, ‘Internet como instrumento para la yihad’ (2006) 8 Araucaria 80–99.
  • Metin Gürcan & M. Erdoğan, “Siber Terörizm ve Kritik Altyapılar.” Güvenlik Bilimleri Dergisi, Cilt 7, Sayı 2 (2018): ss. 65–90.
  • OGUN MN and Kaya A, ‘Siber Güvenliğin Milli Güvenlik Açısından Önemi ve Alınabilecek Tedbirler’ (2013) 9(18) Güvenlik Stratejileri Dergisi 145–181.
  • OGUN MN, YURTSEVER S, ASLAN M and ELBURASI M, ‘Terrorist Use of Cyber Technology’ (2021) 9 International Conference on Natural Sciences and Technologies, 113–128 https://doi.org/10.20290/estubtdb.1021324.
  • Oğün, S. & Kaya, Ö., “Siber Güvenliğin Milli Güvenlik Açısından Önemi.” Uluslararası Güvenlik ve Terörizm Dergisi, Cilt 4, Sayı 1 (2013): ss. 27–45.
  • Özdemir B. “Türkiye’nin Siber Güvenlik Stratejileri.” Journal of National Defense 12, no. 3 (2020): 100–115.
  • Pollitt M, ‘Cyberterrorism: Fact or Fancy?’ 9.
  • Post JM, Ruby KG and Shaw ED, ‘From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism’ (2000) 12 Terrorism and Political Violence 101.
  • Proofpoint, ‘What Is a Cyber-Attack?’ https://www.proofpoint.com/au/threat-reference/cyber-attack accessed 28 April 2025.
  • Sánchez Medero G, ‘Ciberespacio y el crimen organizado. Los nuevos desafíos del siglo XXI’ (2012) 10(16) Facultad de Ciencias Políticas y Sociología Universidad Complutense de Madrid 71–87.
  • Seissa IG, ‘Cyber-terrorism Definition Patterns and Mitigation Strategies: A Literature Review’ (2017) 6(1) International Journal of Science and Research (IJSR) 180–186.
  • Terrorism C o. (ed), Responses to Cyber Terrorism (1st edn, vol 34, IOS Press 2008).
  • UN Security Council Resolutions 1373, 1566.
  • Yurtsever B. Küreselleşen Dünyada Terörizm: Siber Terörizm Örneği. Yüksek Lisans Tezi, Niğde Ömer Halisdemir Üniversitesi, Kasım 2020, s. 82.
  • Wardlaw G, Political Terrorism: Theory, Tactics, and Countermeasures (Cambridge University Press 1982).
  • Weimann G, ‘Cyberterrorism: The Sum of All Fears’ (2005) 28(2) Studies in Conflict and Terrorism 129–149 https://doi.org/10.1080/10576100590905110.
  • Weimann G, ‘How Modern Terrorism Uses the Internet’ (2004) http://ics.leeds.ac.uk/papers/vp01.cfm?outfit=pmt&requesttimeout=500&folder=1259&paper=1542.
  • Whiting A, Macdonald S and Jarvis L, Cyberterrorism: Understandings, Debates and Representations.
Toplam 39 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Hukuk (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Kayser (qaisar) Nasrat 0000-0003-4676-8122

Gönderilme Tarihi 6 Kasım 2025
Kabul Tarihi 7 Ocak 2026
Yayımlanma Tarihi 8 Ocak 2026
Yayımlandığı Sayı Yıl 2026 Cilt: 23 Sayı: 1

Kaynak Göster

APA Nasrat, K. (qaisar). (2026). CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE? Yeditepe Üniversitesi Hukuk Fakültesi Dergisi, 23(1), 243-268. https://doi.org/10.63117/yuhfd.1819058
AMA Nasrat K (qaisar). CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE? YÜHFD. Ocak 2026;23(1):243-268. doi:10.63117/yuhfd.1819058
Chicago Nasrat, Kayser (qaisar). “CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?”. Yeditepe Üniversitesi Hukuk Fakültesi Dergisi 23, sy. 1 (Ocak 2026): 243-68. https://doi.org/10.63117/yuhfd.1819058.
EndNote Nasrat K (qaisar) (01 Ocak 2026) CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE? Yeditepe Üniversitesi Hukuk Fakültesi Dergisi 23 1 243–268.
IEEE K. (qaisar) Nasrat, “CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?”, YÜHFD, c. 23, sy. 1, ss. 243–268, 2026, doi: 10.63117/yuhfd.1819058.
ISNAD Nasrat, Kayser (qaisar). “CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?”. Yeditepe Üniversitesi Hukuk Fakültesi Dergisi 23/1 (Ocak2026), 243-268. https://doi.org/10.63117/yuhfd.1819058.
JAMA Nasrat K (qaisar). CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE? YÜHFD. 2026;23:243–268.
MLA Nasrat, Kayser (qaisar). “CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?”. Yeditepe Üniversitesi Hukuk Fakültesi Dergisi, c. 23, sy. 1, 2026, ss. 243-68, doi:10.63117/yuhfd.1819058.
Vancouver Nasrat K (qaisar). CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE? YÜHFD. 2026;23(1):243-68.