Cyber Security: Global Trends & Türkiye’s Capabilities Report | SETA Emerging Military Technologies Series .2.

The quantification of fronts began to attract interest in the late twentieth century with the development of new concepts like the electronic order of battle, electronic warfare, information warfare and network-centered operations.

The quantification of fronts began to attract interest in the late twentieth century with the development of new concepts like the electronic order of battle, electronic warfare, information warfare and network-centered operations. Today, almost all components of the modern armed forces have already been equipped with software- and hardware-backed systems. Whereas most military systems are operated by being isolated from cyberspace, there are projects under development to create an military Internet of Things (IoT) in the near future.

Cyber threats represent the most significant security issue for all systems operating in the cyberspace. That is why the effective conduct of cyber space activities depends on the active definition, identification, analysis and mitigation of cyber threats. At the same time, most of the concepts that fall within the scope of cyber security can be used in two ways — just as cyber weapons can be used for cyber defense and cyber attacks. That is why the components, which make up critical infrastructure, being damaged could directly lead to national security vulnerabilities. Therefore, ensuring effective cyber security in all civilian and military layers must be treated as a priority.

Click here to view the study.


In this article