Buch, Englisch, 232 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
NATO and Turkiye's Cyber Terrorism Policies
Buch, Englisch, 232 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
Reihe: Security, Audit and Leadership Series
ISBN: 978-1-032-80228-2
Verlag: Taylor & Francis Ltd
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread damage to the country’s economy, politics and security. However, despite this series of cyber-attacks, NATO did not apply Article 5 of the North Atlantic Treaty due to lack of consensus on applying Article 5 in the Estonian case. Although various approaches have been developed by scholars, there is no common application of international law in the United Nations Charter regarding cyber threats or attacks. Moreover, whilst there has been no common definition of ‘cyber terrorism’ by the international community, some scholars regard ‘cyber-attacks’ as acts of war. There is a paucity of literature dealing with the application of international law on cyber threats. A new Strategic Concept was adopted in 2010. Its most important development was to identify the significance of cyber threats to all NATO body members. When updating its own technology, the organization needs to be ready to defend itself against all kinds of asymmetrical warfare, whether from within or beyond its operational range. However, the terms of Article 5 of the North Atlantic Treaty were imprecise as to whether cyber-attacks can be regarded as a form of threat; for this reason, NATO accepted the case-by-case concept on cyber threats/attacks in terms of the application of Article 5 by the Wales Summit in 2014. Despite the fact that the Charter of the United Nations has not been revised, if its articles are broadly evaluated, cyber-attacks would be accepted as a threat or use of force against the territorial integrity of a state. The main purpose of this book is to analyze and evaluate what has been carried out regarding NATO’s operational arrangements and its Cyber Defense approach, and, secondly, to explain this in the lens of Game Theory. Furthermore, it will demonstrate why the web is paramount to NATO’s system-driven operations, and why it requires a Cyber Defense arrangement. In particular, the research endeavors to analyze Türkiye in this regard. The cyber-attack on Estonia in 2007 will be used by way of a case study to explain the development of threat perceptions, risks, international law, cyber security policies and application of Game Theory.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Politikwissenschaft Internationale Beziehungen
- Sozialwissenschaften Soziologie | Soziale Arbeit Soziale Gruppen/Soziale Themen Ethische Themen & Debatten
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Sozialwissenschaften Politikwissenschaft Regierungspolitik Innen-, Bildungs- und Bevölkerungspolitik
- Sozialwissenschaften Politikwissenschaft Militärwesen Nationale und Internationale Sicherheits- und Verteidigungspolitik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Preface Author Biography List of abbreviations Introduction Chapter 1 CASE STUDY OF CYBER TERRORISM: ESTONIA Chapter 2 THE HISTORICAL BACKGROUND OF THE CONCEPT OF THREAT AND THE ASSESSMENT OF THE RISK Chapter 3 GAME THEORY Chapter 4 THE CYBER SECURITY POLICY OF NATO Chapter 5 THE CYBER SECURITY POLICY OF TÜRKIYE CONCLUSION References