2018 Cilt 37 Sayı 2
Permanent URI for this collectionhttps://hdl.handle.net/11452/18049
Browse
Browsing by Subject "Cyber security"
Now showing 1 - 1 of 1
- Results Per Page
- Sort Options
Item Cyber attacks against turkey right after shotting down Russian su-24 aircaraft(Bursa Uludağ Üniversitesi, 2018) Darıcılı, Ali BurakRussian Federation (RF), which has an effective cyber attack capacity at the global level, does not hesitate to use this capacity as a pressure instrument for the states in which it has problems in foreign policy. Examples of this policy include cyber attacks allegedly carried out against Estonia in 2007, Georgia and Lithuania in 2008, and Kyrgyzstan in 2009. November 24, 2015 Date of Turkish F-16 of airspace after the lowering of a Russian Su-24 aircraft that violate December 14, 2015 date in Turkey's mainly financial institutions that target "DDoS" attacks include similarities with the specified cyber attacks On the other hand, it should be taken into consideration that even though the attacks can be claimed to be of RF origin, the cyber space can easily hide the real identity of the attacker due to its anonymous structure. In this context, it may never be clear that such cyber attacks are planned by RF. This is due to the anonymous structure of cyber space. However, in this article, it will be tried to analyze why cyber attacks are likely to be caused by RF.